A Review on the effectiveness of Dimensional Reduction with
Computational Forensics: An Application on Malware Analysis
- URL: http://arxiv.org/abs/2301.06031v1
- Date: Sun, 15 Jan 2023 07:34:31 GMT
- Title: A Review on the effectiveness of Dimensional Reduction with
Computational Forensics: An Application on Malware Analysis
- Authors: Aye Thaw Da Naing, Justin Soh Beng Guan, Yarzar Shwe Win, Jonathan Pan
- Abstract summary: We evaluate the effectiveness of the application of Principle Component Analysis on Computational Forensics task of detecting Android based malware.
Our research result showed that the dimensionally reduced dataset would result in a measure of degradation in accuracy performance.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The Android operating system is pervasively adopted as the operating system
platform of choice for smart devices. However, the strong adoption has also
resulted in exponential growth in the number of Android based malicious
software or malware. To deal with such cyber threats as part of cyber
investigation and digital forensics, computational techniques in the form of
machine learning algorithms are applied for such malware identification,
detection and forensics analysis. However, such Computational Forensics
modelling techniques are constrained the volume, velocity, variety and veracity
of the malware landscape. This in turn would affect its identification and
detection effectiveness. Such consequence would inherently induce the question
of sustainability with such solution approach. One approach to optimise
effectiveness is to apply dimensional reduction techniques like Principal
Component Analysis with the intent to enhance algorithmic performance. In this
paper, we evaluate the effectiveness of the application of Principle Component
Analysis on Computational Forensics task of detecting Android based malware. We
applied our research hypothesis to three different datasets with different
machine learning algorithms. Our research result showed that the dimensionally
reduced dataset would result in a measure of degradation in accuracy
performance.
Related papers
- A Novel Reinforcement Learning Model for Post-Incident Malware Investigations [0.0]
This Research proposes a Novel Reinforcement Learning model to optimise malware forensics investigation during cyber incident response.
It aims to improve forensic investigation efficiency by reducing false negatives and adapting current practices to evolving malware signatures.
arXiv Detail & Related papers (2024-10-19T07:59:10Z) - Comprehensive evaluation of Mal-API-2019 dataset by machine learning in malware detection [0.5475886285082937]
This study conducts a thorough examination of malware detection using machine learning techniques.
The aim is to advance cybersecurity capabilities by identifying and mitigating threats more effectively.
arXiv Detail & Related papers (2024-03-04T17:22:43Z) - A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences [5.218427110506892]
This paper introduces a malware detection system for smartphones based on studying the dynamic behavior of suspicious applications.
The approach focuses on identifying malware addressed against the Android platform.
The proposal has been tested in different experiments that include an in-depth study of a particular use case.
arXiv Detail & Related papers (2024-02-05T22:21:54Z) - Discovering Malicious Signatures in Software from Structural
Interactions [7.06449725392051]
We propose a novel malware detection approach that leverages deep learning, mathematical techniques, and network science.
Our approach focuses on static and dynamic analysis and utilizes the Low-Level Virtual Machine (LLVM) to profile applications within a complex network.
Our approach marks a substantial improvement in malware detection, providing a notably more accurate and efficient solution.
arXiv Detail & Related papers (2023-12-19T23:42:20Z) - Malicious code detection in android: the role of sequence characteristics and disassembling methods [0.0]
We investigate and emphasize the factors that may affect the accuracy values of the models managed by researchers.
Our findings exhibit that the disassembly method and different input representations affect the model results.
arXiv Detail & Related papers (2023-12-02T11:55:05Z) - Towards a Fair Comparison and Realistic Design and Evaluation Framework
of Android Malware Detectors [63.75363908696257]
We analyze 10 influential research works on Android malware detection using a common evaluation framework.
We identify five factors that, if not taken into account when creating datasets and designing detectors, significantly affect the trained ML models.
We conclude that the studied ML-based detectors have been evaluated optimistically, which justifies the good published results.
arXiv Detail & Related papers (2022-05-25T08:28:08Z) - Improving robustness of jet tagging algorithms with adversarial training [56.79800815519762]
We investigate the vulnerability of flavor tagging algorithms via application of adversarial attacks.
We present an adversarial training strategy that mitigates the impact of such simulated attacks.
arXiv Detail & Related papers (2022-03-25T19:57:19Z) - Human-in-the-Loop Disinformation Detection: Stance, Sentiment, or
Something Else? [93.91375268580806]
Both politics and pandemics have recently provided ample motivation for the development of machine learning-enabled disinformation (a.k.a. fake news) detection algorithms.
Existing literature has focused primarily on the fully-automated case, but the resulting techniques cannot reliably detect disinformation on the varied topics, sources, and time scales required for military applications.
By leveraging an already-available analyst as a human-in-the-loop, canonical machine learning techniques of sentiment analysis, aspect-based sentiment analysis, and stance detection become plausible methods to use for a partially-automated disinformation detection system.
arXiv Detail & Related papers (2021-11-09T13:30:34Z) - Increasing the Confidence of Deep Neural Networks by Coverage Analysis [71.57324258813674]
This paper presents a lightweight monitoring architecture based on coverage paradigms to enhance the model against different unsafe inputs.
Experimental results show that the proposed approach is effective in detecting both powerful adversarial examples and out-of-distribution inputs.
arXiv Detail & Related papers (2021-01-28T16:38:26Z) - A black-box adversarial attack for poisoning clustering [78.19784577498031]
We propose a black-box adversarial attack for crafting adversarial samples to test the robustness of clustering algorithms.
We show that our attacks are transferable even against supervised algorithms such as SVMs, random forests, and neural networks.
arXiv Detail & Related papers (2020-09-09T18:19:31Z) - Bayesian Optimization with Machine Learning Algorithms Towards Anomaly
Detection [66.05992706105224]
In this paper, an effective anomaly detection framework is proposed utilizing Bayesian Optimization technique.
The performance of the considered algorithms is evaluated using the ISCX 2012 dataset.
Experimental results show the effectiveness of the proposed framework in term of accuracy rate, precision, low-false alarm rate, and recall.
arXiv Detail & Related papers (2020-08-05T19:29:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.