Static analysis of executable files by machine learning methods

07/15/2020
by   Nikolay Prudkovskiy, et al.
0

The paper describes how to detect malicious executable files based on static analysis of their binary content. The stages of pre-processing and cleaning data extracted from different areas of executable files are analyzed. Methods of encoding categorical attributes of executable files are considered, as are ways to reduce the feature field dimension and select characteristic features in order to effectively represent samples of binary executable files for further training classifiers. An ensemble training approach was applied in order to aggregate forecasts from each classifier, and an ensemble of classifiers of various feature groups of executable file attributes was created in order to subsequently develop a system for detecting malicious files in an uninsulated environment.

READ FULL TEXT

page 11

page 14

page 15

page 19

page 26

page 27

page 29

page 30

research
03/03/2021

Robust PDF Files Forensics Using Coding Style

Identifying how a file has been created is often interesting in security...
research
07/24/2020

Detecting malicious PDF using CNN

Malicious PDF files represent one of the biggest threats to computer sec...
research
04/12/2018

EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models

This paper describes EMBER: a labeled benchmark dataset for training mac...
research
02/01/2021

Can You Accept LaTeX Files from Strangers? Ten Years Later

It is well-known that Microsoft Word/Excel compatible documents or PDF f...
research
04/01/2019

ScriptNet: Neural Static Analysis for Malicious JavaScript Detection

Malicious scripts are an important computer infection threat vector in t...
research
06/12/2023

Machine Learning Approach on Multiclass Classification of Internet Firewall Log Files

Firewalls are critical components in securing communication networks by ...
research
10/01/2019

Ransomware Analysis using Feature Engineering and Deep Neural Networks

Detection and Analysis of a potential malware specifically, used for ran...

Please sign up or login with your details

Forgot password? Click here to reset