nanoll extt
Please use this identifier to cite or link to this item: http://lrcdrs.bennett.edu.in:80/handle/123456789/887
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSwarnkar, Mayank-
dc.contributor.authorThakkar, Hiren Kumar-
dc.date.accessioned2023-04-03T04:13:27Z-
dc.date.available2023-04-03T04:13:27Z-
dc.date.issued2019-
dc.identifier.isbn9781728143927-
dc.identifier.urihttp://doi.org/10.1109/IACC48062.2019.8971519-
dc.identifier.urihttp://lrcdrs.bennett.edu.in:80/handle/123456789/887-
dc.descriptionhttps://ieeexplore.ieee.org/xpl/conhome/8962270/proceedingen_US
dc.description.abstractExecutable files such as .exe, .bat, .msi etc. are used to install the software in Windows-based machines. However, downloading these files from untrusted sources may have a chance of having maliciousness. Moreover, these executables are intelligently modified by the anomalous user to bypass antivirus definitions. In this paper, we propose a method to detect malicious executables by analyzing Portable Executable (PE) files extracted from executable files. We trained a supervised binary classifier using features extracted from the PE files of normal and malicious executables. We experimented our method on a large publicly available dataset and reported more than 95% of classification accuracy.en_US
dc.language.isoen_USen_US
dc.publisherIEEEen_US
dc.subjectMachine Learning, Malware Analysis, Feature Extraction, Portable Executableen_US
dc.titleOn the Design of Supervised Binary Classifiers for Malware Detection Using Portable Executable Filesen_US
dc.typeArticleen_US
dc.indexedSWCen_US
Appears in Collections:Conference Proceedings_ SCSET

Files in This Item:
File Description SizeFormat 
273-416.pdf
  Restricted Access
132.68 kBAdobe PDFView/Open Request a copy

Contact admin for Full-Text

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.