Identifying Memory Dump Malware Using Supervised Learning

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Memory analysis is important in detecting malicious programs since it may capture many traits and behaviors. While there is a lot of research in the field, there are several important challenges in malware detection, such as detection rate and sophisticated malware obfuscation. Because sophisticated malware uses obfuscation and other ways to avoid detection, there is a significant demand for a framework that focuses on identifying obfuscation and hidden malware. In this paper, two scenarios were proposed, one with the full dataset and one using the correlation matrix to choose the most effective features for classification. Three classification algorithms were applied against each scenario which are K-nearest neighbor (KNN), Decision Tree (DT), and Random Forest (RF). High detection accuracy has been recorded, reaching 99.90% in identifying normal from an anomaly.

Cite

CITATION STYLE

APA

Klaib, A. K., Al-Nabhan, M., & Abu Al-Haija, Q. (2023). Identifying Memory Dump Malware Using Supervised Learning. In Lecture Notes in Networks and Systems (Vol. 587, pp. 1009–1020). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-19-7874-6_74

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free