CFP last date
20 January 2025
Reseach Article

Web based Malware Detection using Important Supervised Learning Techniques on Online Web Traffic

by R.M. Yadav, R.K. Bhagel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 17
Year of Publication: 2015
Authors: R.M. Yadav, R.K. Bhagel
10.5120/ijca2015906932

R.M. Yadav, R.K. Bhagel . Web based Malware Detection using Important Supervised Learning Techniques on Online Web Traffic. International Journal of Computer Applications. 130, 17 ( November 2015), 39-43. DOI=10.5120/ijca2015906932

@article{ 10.5120/ijca2015906932,
author = { R.M. Yadav, R.K. Bhagel },
title = { Web based Malware Detection using Important Supervised Learning Techniques on Online Web Traffic },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 17 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 39-43 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number17/23305-2015906932/ },
doi = { 10.5120/ijca2015906932 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:25:56.379293+05:30
%A R.M. Yadav
%A R.K. Bhagel
%T Web based Malware Detection using Important Supervised Learning Techniques on Online Web Traffic
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 17
%P 39-43
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Malwares on the websites can be harmful for the host machine. It may result in security breach, data loss, or denial of service at the host end. Many approaches for malware prediction have been applied in the past. Supervised machine learning approaches are popular and efficient in terms of accuracy. These techniques can be very useful for malware prediction using web traffic. Alarm for malware can be generated well before the attack and damage by simply just monitoring the web traffic. In this paper comparative analysis of supervised machine learning approaches which includes Naïve bayes, Support vector machine, PART and J48 is done. These methods are compared in terms of accuracy of prediction, false positive, false negative, true positive and true negative. This analysis is done using Weka tool.

References
  1. M. Christodorescu, S. Jha, and C.Kruegel, “Mining specifications of malicious behavior” In Proceedings of ESEC/FSE07, pages 5-14, 2007.
  2. J. Kolter and M. Maloof, “Learning to detect malicious executables in the wild” In Proceedings of KDD'04, 2004.
  3. M. Schultz, E. Eskin, and E. Zadok “Data mining methods for detection of new malicious executables” In Security and Privacy, 2001. Proceedings. 2001 IEEE Symposium on 14-16 May, pages 38-49, 2001.
  4. Yung-Tsung Hou, yimeng Chang, Tsuhan Chen, Chi-Sung Laih, Chai-Mei Chen, “Malicious web content detection by machine learning” on Expert Systems with Applications 37 (2010) page 55-60.
  5. Katerina Goseva-Popstojanova, Goce Anastasovski, Ana Dimitrijevikj, Risto Pantev, Brandon Miller,”Characterization and classification of malicious Web traffic” in Computer and Network Security 42 (2014) page92-115.
  6. PingWang, Yu-ShihWang, “Malware behavioral detection and vaccine development by using a support vector model classifier” in Journal of Computer and System Sciences 81 (2015) page 1012–1026.
  7. Rafiqul Islam, RonghuaTian, Lynn M.Batten, Steve Versteeg ,”Classification of malware based on integrated static and dynamic features” in Journal of Network and Computer Applications 36 (2013) page 646–656.
  8. Asaf Shabtai, Robert Moskovitch, Yuval Elovici, Chanan Glezer,”Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey” in information security technical report 14 (2009) page 16 – 29.
  9. Chang-Hwan Lee,” A gradient approach for value weighted classification learning in naïve Bayes” Knowledge-Based Systems 85 (2015) page 71–79.
  10. National Vulerabilty 2013 database http://nvd.nist.gov/.
  11. Tom Michael Mitchell, "Machine Learning 1 Edition", McGraw Hill. New York, March, 1997: 112-143.
  12. Lewis David Dolan, "Representation and Learning in Information Retrieval", Ph.D. Thsis, Department of Computer and Information Science, University of Massachusetts, COINS Technical Report 91-93, 1991.
  13. CoW. Hsu, C-C Chang, and C-l. Lin, "A Practical Guide to Support Vector Classification," Taipei, Apr. 2010.
  14. R.-E. Fan, K.-W. Chang, C.-J. Hsieh, X.-R. Wang, and C-J. Lin, "LIBLINEAR: A Library for Large Linear Classification," Journal of Machine Learning Research, vol. 9,pp. 1871-1874, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Web Based Malware Supervised learning Naive Bayes SVM J48 PART