Affiliation:
1. RMD Sinhgad School of Engineering, SPPU, Pune, India
Abstract
As the proliferation of digital technology continues, the threat landscape for Windows operating systems has become increasingly complex. Malicious applications, including viruses, ransomware, and spyware, pose a significant risk to both individuals and organizations. To combat this growing threat, there is a pressing need for effective and efficient methods for detecting and mitigating malicious applications. This research paper presents an innovative approach to Malicious Application Detection in Windows using Support Vector Machine (SVM) algorithms. SVM is a powerful machine learning technique that has been successfully applied in various classification tasks, including malware detection. The primary objective of this study is to develop a robust and reliable system that can differentiate between benign and malicious applications in a Windows environment. We start by collecting a comprehensive dataset of Windows applications, comprising both legitimate and malicious software samples. Feature extraction techniques are employed to convert the application data into a suitable format for SVM analysis. These features may include file attributes, system call sequences, and behaviour analysis metrics
Reference10 articles.
1. Mahmoud Alfadel, Diego Elias Costa, and Emad Shihab. 2021. Empirical Analysis of Security Vulnerabilities in Python Packages. In 2021 IEEE International Conference on Software Analysis, Evolutionand Reengineering(SANER).446–457. https://doi.org/10.1109/SANER50967.2021.00048
2. Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, and Eric Bodden. 2015. Mining Apps for Abnormal Usage of Sensitive Data. In 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol. 1. 426–436. https://doi.org/10.1109/ICSE.2015.61
3. Aadesh Bagmar, Josiah Wedgwood, Dave Levin, and Jim Purtilo. 2021. I Know What You Imported Last Summer: A study of security threats in the Python ecosystem. CoRR abs/2102.06301 (2021). arXiv:2102.06301 https://arxiv.org/abs/ 2102.06301
4. Adam Baldwin. 2019. Plot to steal cryptocurrency foiled by the npm security team. https://blog.npmjs.org/post/185397814280/plotto-steal-cryptocurrencyfoiled-by-the-npm.
5. Alex Birsan. 2021. Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies. https://medium.com/@alex.birsan/ dependency-confusion-4a5d60fec610