Abstract | ||
---|---|---|
Having a machine learning algorithm that can correctly classify malicious software has become a necessity as oldmethods of detection based on hashes and hand written heuristics tend to fail when dealing with the intensive flow of new malware. However, in order to be practical, the machine learning classifiers must also have a reasonable training time and a very small amount, preferably zero, of false positives. There were a few authors who addressed both these issues in their papers but creating such a model is more difficult when more than 3 million files are involved/needed in the training. We mapped a zero false positive perceptron in a new space, applied a feature selection algorithm and used the resulted model in an ensemble, voting or a rule based clustering system we've managed to achieve a detection rate around 99% and 0.07% false positives while keeping the training time suitable for large data sets. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1007/s11416-013-0188-1 | J. Computer Virology and Hacking Techniques |
Keywords | Field | DocType |
Malware detection, One side class algorithm, False positives, Machine learning, Large data sets | Data mining,Rule-based system,Feature selection,Computer science,Heuristics,Artificial intelligence,Classifier (linguistics),Malware,Cluster analysis,Perceptron,Machine learning,False positive paradox | Journal |
Volume | Issue | ISSN |
9 | 4 | 2263-8733 |
Citations | PageRank | References |
6 | 0.54 | 10 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Cristina Vatamanu | 1 | 31 | 3.61 |
Dragos Gavrilut | 2 | 62 | 7.95 |
Razvan-Mihai Benchea | 3 | 6 | 0.54 |