Skip to main content

Machine Learning-Based System for Detecting Unseen Malicious Software

  • Chapter
  • First Online:
Applications in Electronics Pervading Industry, Environment and Society

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 351))

Abstract

In the Internet age, malicious software (malware) represents a serious threat to the security of information systems. Malware-detection systems to protect computers must perform a real-time analysis of the executable files. The paper shows that machine-learning methods can support the challenging, yet critical, task of unseen malware recognition, i.e., the classification of malware variants that were not included in the training set. The experimental verification involved a publicly available dataset, and confirmed the effectiveness of the overall approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kolbitsch, C., Milani, P., Kruegel, C., Kirda, E., Zhou, X., Wang, X.: Effective and efficient malware detection at the end host. In: Proceedings of the 18th USENIX Security Symposium (Security ’09), pp. 351–366, Montreal, Canada, Aug 2009, USENIX (2009)

    Google Scholar 

  2. Rieck, K., Trinius, P., Willems, C., Holz, T.: Automatic analysis of malware behavior using machine learning. J. Comput. Secur. 19(4), 639–668 (2011)

    Google Scholar 

  3. Kolter, J.Z., Maloof, M.A.: Learning to detect and classify malicious executables in the wild. The. J. Mach. Learn. Res. 7, 2721–2744 (2006)

    MathSciNet  MATH  Google Scholar 

  4. Vapnik, V.N.: Statistical Learning Theory. Wiley, New York (1998)

    Google Scholar 

  5. Ridella, S., Rovetta, S., Zunino, R.: Plastic neural gas for adaptive vector quantization. IEEE Trans. Neural Netw. (2001)

    Google Scholar 

  6. Willems, C., Holz, T., Freiling, F.: CWSandbox: towards automated dynamic binary analysis. IEEE Secur. Privacy 5(2) (2007)

    Google Scholar 

  7. Cuckoo Sandbox. http://www.cuckoosandbox.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Federica Bisio .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Bisio, F., Gastaldo, P., Meda, C., Nasta, S., Zunino, R. (2016). Machine Learning-Based System for Detecting Unseen Malicious Software. In: De Gloria, A. (eds) Applications in Electronics Pervading Industry, Environment and Society. Lecture Notes in Electrical Engineering, vol 351. Springer, Cham. https://doi.org/10.1007/978-3-319-20227-3_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-20227-3_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-20226-6

  • Online ISBN: 978-3-319-20227-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics