Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

symmetry-logo

Article Menu

machine learning malware detection thesis

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Malware analysis and detection using machine learning algorithms.

machine learning malware detection thesis

1. Introduction

2. literature review, 3. research problem, 4. methodology, 4.1. dataset, 4.2. pre-processing, 4.3. features extraction, 4.4. features selection, 5. results and discussion, logistic regression, 6. conclusions, author contributions, institutional review board statement, informed consent statement, data availability statement, conflicts of interest, abbreviations.

CNNConvolutional Neural Network
FPRFalse Positive Rate
RBMRestricted Boltzmann Machine
DTDecision Tree
SVMSupport Vector Machine
VMVirtual Machine
  • Nikam, U.V.; Deshmuh, V.M. Performance evaluation of machine learning classifiers in malware detection. In Proceedings of the 2022 IEEE International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE), Ballari, India, 23–24 April 2022; pp. 1–5. [ Google Scholar ] [ CrossRef ]
  • Akhtar, M.S.; Feng, T. IOTA based anomaly detection machine learning in mobile sensing. EAI Endorsed Trans. Create. Tech. 2022 , 9 , 172814. [ Google Scholar ] [ CrossRef ]
  • Sethi, K.; Kumar, R.; Sethi, L.; Bera, P.; Patra, P.K. A novel machine learning based malware detection and classification framework. In Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), Oxford, UK, 3–4 June 2019; pp. 1–13. [ Google Scholar ]
  • Abdulbasit, A.; Darem, F.A.G.; Al-Hashmi, A.A.; Abawajy, J.H.; Alanazi, S.M.; Al-Rezami, A.Y. An adaptive behavioral-based increamental batch learning malware variants detection model using concept drift detection and sequential deep learning. IEEE Access 2021 , 9 , 97180–97196. [ Google Scholar ] [ CrossRef ]
  • Feng, T.; Akhtar, M.S.; Zhang, J. The future of artificial intelligence in cybersecurity: A comprehensive survey. EAI Endorsed Trans. Create. Tech. 2021 , 8 , 170285. [ Google Scholar ] [ CrossRef ]
  • Sharma, S.; Krishna, C.R.; Sahay, S.K. Detection of advanced malware by machine learning techniques. In Proceedings of the SoCTA 2017, Jhansi, India, 22–24 December 2017. [ Google Scholar ]
  • Chandrakala, D.; Sait, A.; Kiruthika, J.; Nivetha, R. Detection and classification of malware. In Proceedings of the 2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA), Coimbatore, India, 8–9 October 2021; pp. 1–3. [ Google Scholar ] [ CrossRef ]
  • Zhao, K.; Zhang, D.; Su, X.; Li, W. Fest: A feature extraction and selection tool for android malware detection. In Proceedings of the 2015 IEEE Symposium on Computers and Communication (ISCC), Larnaca, Cyprus, 6–9 July 2015; pp. 714–720. [ Google Scholar ]
  • Akhtar, M.S.; Feng, T. Detection of sleep paralysis by using IoT based device and its relationship between sleep paralysis and sleep quality. EAI Endorsed Trans. Internet Things 2022 , 8 , e4. [ Google Scholar ] [ CrossRef ]
  • Gibert, D.; Mateu, C.; Planes, J.; Vicens, R. Using convolutional neural networks for classification of malware represented as images. J. Comput. Virol. Hacking Tech. 2019 , 15 , 15–28. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Firdaus, A.; Anuar, N.B.; Karim, A.; Faizal, M.; Razak, A. Discovering optimal features using static analysis and a genetic search based method for Android malware detection. Front. Inf. Technol. Electron. Eng. 2018 , 19 , 712–736. [ Google Scholar ] [ CrossRef ]
  • Dahl, G.E.; Stokes, J.W.; Deng, L.; Yu, D.; Research, M. Large-scale Malware Classification Using Random Projections And Neural Networks. In Proceedings of the International Conference on Acoustics, Speech and Signal Processing-1988, Vancouver, BC, Canada, 26–31 May 2013; pp. 3422–3426. [ Google Scholar ]
  • Akhtar, M.S.; Feng, T. An overview of the applications of artificial intelligence in cybersecurity. EAI Endorsed Trans. Create. Tech. 2021 , 8 , e4. [ Google Scholar ] [ CrossRef ]
  • Akhtar, M.S.; Feng, T. A systemic security and privacy review: Attacks and prevention mechanisms over IOT layers. EAI Endorsed Trans. Secur. Saf. 2022 , 8 , e5. [ Google Scholar ] [ CrossRef ]
  • Anderson, B.; Storlie, C.; Lane, T. "Improving Malware Classification: Bridging the Static/Dynamic Gap. In Proceedings of the 5th ACM Workshop on Security and Artificial Intelligence (AISec), Raleigh, NC, USA, 19 October 2012; pp. 3–14. [ Google Scholar ]
  • Varma, P.R.K.; Raj, K.P.; Raju, K.V.S. Android mobile security by detecting and classification of malware based on permissions using machine learning algorithms. In Proceedings of the 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 10–11 February 2017; pp. 294–299. [ Google Scholar ]
  • Akhtar, M.S.; Feng, T. Comparison of classification model for the detection of cyber-attack using ensemble learning models. EAI Endorsed Trans. Scalable Inf. Syst. 2022 , 9 , 17329. [ Google Scholar ] [ CrossRef ]
  • Rosmansyah, W.Y.; Dabarsyah, B. Malware detection on Android smartphones using API class and machine learning. In Proceedings of the 2015 International Conference on Electrical Engineering and Informatics (ICEEI), Denpasar, Indonesia, 10–11 August 2015; pp. 294–297. [ Google Scholar ]
  • Tahtaci, B.; Canbay, B. Android Malware Detection Using Machine Learning. In Proceedings of the 2020 Innovations in Intelligent Systems and Applications Conference (ASYU), Istanbul, Turkey, 15–17 October 2020; pp. 1–6. [ Google Scholar ]
  • Baset, M. Machine Learning for Malware Detection. Master’s Dissertation, Heriot Watt University, Edinburg, Scotland, December 2016. [ Google Scholar ] [ CrossRef ]
  • Akhtar, M.S.; Feng, T. Deep learning-based framework for the detection of cyberattack using feature engineering. Secur. Commun. Netw. 2021 , 2021 , 6129210. [ Google Scholar ] [ CrossRef ]
  • Altaher, A. Classification of android malware applications using feature selection and classification algorithms. VAWKUM Trans. Comput. Sci. 2016 , 10 , 1. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Chowdhury, M.; Rahman, A.; Islam, R. Malware Analysis and Detection Using Data Mining and Machine Learning Classification ; AISC: Chicago, IL, USA, 2017; pp. 266–274. [ Google Scholar ]
  • Patil, R.; Deng, W. Malware Analysis using Machine Learning and Deep Learning techniques. In Proceedings of the 2020 SoutheastCon, Raleigh, NC, USA, 28–29 March 2020; pp. 1–7. [ Google Scholar ]
  • Gavriluţ, D.; Cimpoesu, M.; Anton, D.; Ciortuz, L. Malware detection using machine learning. In Proceedings of the 2009 International Multiconference on Computer Science and Information Technology, Mragowo, Poland, 12–14 October 2009; pp. 735–741. [ Google Scholar ]
  • Pavithra, J.; Josephin, F.J.S. Analyzing various machine learning algorithms for the classification of malwares. IOP Conf. Ser. Mater. Sci. Eng. 2020 , 993 , 012099. [ Google Scholar ] [ CrossRef ]
  • Vanjire, S.; Lakshmi, M. Behavior-Based Malware Detection System Approach For Mobile Security Using Machine Learning. In Proceedings of the 2021 International Conference on Artificial Intelligence and Machine Vision (AIMV), Gandhinagar, India, 24–26 September 2021; pp. 1–4. [ Google Scholar ]
  • Agarkar, S.; Ghosh, S. Malware detection & classification using machine learning. In Proceedings of the 2020 IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC), Gunupur Odisha, India, 16–17 December 2020; pp. 1–6. [ Google Scholar ]
  • Sethi, K.; Chaudhary, S.K.; Tripathy, B.K.; Bera, P. A novel malware analysis for malware detection and classification using machine learning algorithms. In Proceedings of the 10th International Conference on Security of Information and Networks, Jaipur, India, 13–15 October 2017; pp. 107–113. [ Google Scholar ]
  • Ahmadi, M.; Ulyanov, D.; Semenov, S.; Trofimov, M.; Giacinto, G. Novel feature ex-traction, selection and fusion for effective malware family classification. In Proceedings of the sixth ACM conference on data and application security and privacy, New Orleans, LA, USA, 9–11 March 2016; pp. 183–194. [ Google Scholar ]
  • Damshenas, M.; Dehghantanha, A.; Mahmoud, R. A survey on malware propagation, analysis and detec-tion. Int. J. Cyber-Secur. Digit. Forensics 2013 , 2 , 10–29. [ Google Scholar ]
  • Saad, S.; Briguglio, W.; Elmiligi, H. The curious case of machine learning in malware detection. arXiv 2019 , arXiv:1905.07573. [ Google Scholar ]
  • Selamat, N.; Ali, F. Comparison of malware detection techniques using machine learning algorithm. Indones. J. Electr. Eng. Comput. Sci. 2019 , 16 , 435. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Firdausi, I.; Lim, C.; Erwin, A.; Nugroho, A. Analysis of machine learning techniques used in behavior-based malware detection. In Proceedings of the 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies, Jakarta, Indonesia, 2–3 December 2010; pp. 201–203. [ Google Scholar ] [ CrossRef ]
  • Hamid, F. Enhancing malware detection with static analysis using machine learning. Int. J. Res. Appl. Sci. Eng. Technol. 2019 , 7 , 38–42. [ Google Scholar ] [ CrossRef ]
  • Prabhat, K.; Gupta, G.P.; Tripathi, R. TP2SF: A trustworthy privacy-preserving secured framework for sustainable smart cities by leveraging blockchain and machine learning. J. Syst. Archit. 2021 , 115 , 101954. [ Google Scholar ]
  • Kumar, P.; Gupta, G.P.; Tripathi, R. A distributed ensemble design based intrusion detection system using fog computing to protect the internet of things networks. J. Ambient Intell. Human. Comput. 2021 , 12 , 9555–9572. [ Google Scholar ] [ CrossRef ]
  • Prabhat, K.; Gupta, G.P.; Tripathi, R. Design of anomaly-based intrusion detection system using fog computing for IoT network. Aut. Control Comp. Sci. 2021 , 55 , 137–147. [ Google Scholar ] [ CrossRef ]
  • Prabhat, K.; Tripathi, R.; Gupta, G.P. P2IDF: A Privacy-preserving based intrusion detection framework for software defined Internet of Things-Fog (SDIoT-Fog). In Proceedings of the Adjunct Proceedings of the 2021 International Conference on Distributed Computing and Networking (ICDCN ‘21), Nara, Japan, 5–8 January 2021; pp. 37–42. [ Google Scholar ] [ CrossRef ]
  • Kumar, P.; Gupta, G.P.; Tripathi, R. PEFL: Deep privacy-encoding-based federated learning framework for smart agriculture. IEEE Micro 2022 , 42 , 33–40. [ Google Scholar ] [ CrossRef ]

Click here to enlarge figure

File TypeNo. of Files
MalwareBackdoor3654
Rootkit2834
Virus921
Trojan2563
Exploit652
Work921
Others3138
Cleanware2711
Total17,394
MethodsAccuracy (%)TPR (%)FPR (%)
KNN95.0296.173.42
CNN98.7699.223.97
Naïve Byes89.719013
Random Forest92.0195.96.5
SVM96.41984.63
DT9999.072.01
MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

Akhtar, M.S.; Feng, T. Malware Analysis and Detection Using Machine Learning Algorithms. Symmetry 2022 , 14 , 2304. https://doi.org/10.3390/sym14112304

Akhtar MS, Feng T. Malware Analysis and Detection Using Machine Learning Algorithms. Symmetry . 2022; 14(11):2304. https://doi.org/10.3390/sym14112304

Akhtar, Muhammad Shoaib, and Tao Feng. 2022. "Malware Analysis and Detection Using Machine Learning Algorithms" Symmetry 14, no. 11: 2304. https://doi.org/10.3390/sym14112304

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

Title: Improving the Understanding of Malware using Machine Learning

Thumbnail Image

Associated Organization(s)

Collections, supplementary to, permanent link, date issued, resource type, resource subtype, rights statement.

arXiv's Accessibility Forum starts next month!

Help | Advanced Search

Computer Science > Cryptography and Security

Title: malware detection using machine learning and deep learning.

Abstract: Research shows that over the last decade, malware has been growing exponentially, causing substantial financial losses to various organizations. Different anti-malware companies have been proposing solutions to defend attacks from these malware. The velocity, volume, and the complexity of malware are posing new challenges to the anti-malware community. Current state-of-the-art research shows that recently, researchers and anti-virus organizations started applying machine learning and deep learning methods for malware analysis and detection. We have used opcode frequency as a feature vector and applied unsupervised learning in addition to supervised learning for malware classification. The focus of this tutorial is to present our work on detecting malware with 1) various machine learning algorithms and 2) deep learning models. Our results show that the Random Forest outperforms Deep Neural Network with opcode frequency as a feature. Also in feature reduction, Deep Auto-Encoders are overkill for the dataset, and elementary function like Variance Threshold perform better than others. In addition to the proposed methodologies, we will also discuss the additional issues and the unique challenges in the domain, open research problems, limitations, and future directions.
Comments: 11 Pages and 3 Figures
Subjects: Cryptography and Security (cs.CR); Machine Learning (cs.LG)
Cite as: [cs.CR]
  (or [cs.CR] for this version)
  Focus to learn more arXiv-issued DOI via DataCite
Journal reference: Springer, LNCS, Vol. 11297, pp. 402-411, International Conference on Big Data Analytics, 2018
: Focus to learn more DOI(s) linking to related resources

Submission history

Access paper:.

  • Other Formats

References & Citations

  • Google Scholar
  • Semantic Scholar

DBLP - CS Bibliography

Bibtex formatted citation.

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

Android malware detection using static analysis, machine learning and deep learning

Downloadable content.

machine learning malware detection thesis

  • Ahmad, Fawad
  • Strathclyde Thesis Copyright
  • University of Strathclyde
  • Doctoral (Postgraduate)
  • Doctor of Philosophy (PhD)
  • Department of Computer and Information Sciences
  • Android has been a dominant mobile operating system since 2012 as shown in Figure 1. This popularity coupled with a ubiquitous usage of smartphone in all aspects of our lives, e.g. online banking, social networking, and online shopping etc. have made Android a lucrative target for malware developers.To combat the threat of malware stealing our private information, researchers have suggested various techniques for detecting Android malware. Broadly speaking, three primary techniques have been used for malware detection. Static Analysis, performed without running the application, has been used to generate signatures of malware, that can be used to differentiate between malware and benign applications. Another technique, Dynamic Analysis, has been used to create a behaviour profile of malware and benign applications by executing them in a controlled environment and monitoring their behaviour to detect malware. Hybrid Analysis has been used to utilise signatures generated from static analysis and behaviour profile created from dynamic analysis for detecting Android malware. In recent years, complementary techniques such as Machine Learning and Deep Learning have been used to extract features from the three primary analysis techniques and feed them to several algorithms for classification purposes. Deep Learning is a subfield of Machine Learning that relates to structuring algorithms in layers to mimic human neural network. The artificial neural network is used to solve complex problems using different algorithms.In this dissertation, firstly, a systematic review is presented to amalgamate current approaches for detecting Android malware, and custom-built malware detection technologies. As a result of the literature evaluation, a taxonomy is suggested for Android malware detection. Furthermore, trends in the usage of the major analytical techniques and complementary techniques are shown. Research gaps in the Android malware detection area are identified for future research direction.Secondly, Droid Fence, a custom-built web-based framework, for managing experiments is developed. Droid Fence automates the extraction of the required features from malware and benign applications directory by conducting static analysis via a frontend. Next, Droid Fence completes the automated process by storing the extracted features against each application record in a relational database, feeding them to the required machine learning and deep learning algorithms, storing the result into the database, and finally displaying the outcome of each experiment.Thirdly, developed an approach that amalgamates a set of permissions, services, and six other features (usage of https, database, dynamic code, native code, reflection, and cryptography) to generate a matrix that is used for detecting malware effectively. To the best of our knowledge, this is a novel approach that combines these features to detect malware. Droid Fence is evaluated on a dataset of 13191 applications consisting of 5787 malware and 7404 benign applications. Our results show that Droid Fence is very effective when it utilises a Sequential (Deep Learning) algorithm to detect malware, achieving accuracy, F1-measure, precision, and recall scores of 0.971, 0.967, 0.977, and 0.956 respectively. Our experiments, conducted using Droid Fence, demonstrates that deep learning Sequential algorithm scored consistently highly when compared against eight machine learning algorithms. However, the difference between the accuracy scores achieved by the Sequential (97.1%) and Random Forest Classifier (95.8%) is minimal in comparison with the remaining algorithms used in our experiments. We used a stratified k fold cross-validation method, and the result was compared for four metrics: accuracy, F1 score, precision, and recall.Finally, a conclusion and future research direction are suggested for both Android malware detection area and improvement in Droid Fence.
  • Terzis, Sotirios, 1973-
  • Roper, Marc, 1961-
  • Doctoral thesis
  • 10.48730/tr4w-1p93
  • Orion Practice Management Systems Limited
Thumbnail Title Date Uploaded Visibility Actions
2022-07-04 Public

Downloadable Content

machine learning malware detection thesis

Malware detection using machine learning

  • Masters Thesis
  • Donepudi, Naveen
  • Lee, Wonjun
  • Wiegley, Jeffrey
  • McIlhenny, Robert
  • Wang, Taehyung
  • Computer Science
  • California State University, Northridge
  • medium sized dataset
  • recurrent neural network (RNN)
  • one-sided perceptron
  • convolutional neural network
  • Machine learning
  • Malware detection
  • Dissertations, Academic -- CSUN -- Computer Science.
  • random forest
  • decision tree
  • http://hdl.handle.net/10211.3/224558
  • by Naveen Donepudi

California State University, Northridge

Thumbnail Title Date Uploaded Visibility Actions
2023-06-26 Public
2023-06-26 Public
2023-06-26 Public
2023-06-26 Public
2023-06-26 Public
2023-06-26 Public
2023-06-26 Public
2023-06-26 Public

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

  • På svenska
  •   Ammattikorkeakoulut
  • Kaakkois-Suomen ammattikorkeakoulu
  • Opinnäytetyöt
  • Näytä viite

Machine Learning Methods for Malware Detection and Classification

Chumachenko, kateryna (2017).

machine learning malware detection thesis

Avaa tiedosto

Tiivistelmä, selaa kokoelmaa, henkilökunnalle.

Navigation Menu

Search code, repositories, users, issues, pull requests..., provide feedback.

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly.

To see all available qualifiers, see our documentation .

  • Notifications You must be signed in to change notification settings

Bachelor Thesis for XAMK - Machine Learning Methods for Malware Detection and Classification

katerynaCh/Malware-Classification-with-ML

Folders and files.

NameName
33 Commits

Repository files navigation

Machine learning methods for malware detection and classification.

This project is my final work for the Bachelor of Engineering degree in South-Eastern Finland University of APplied Sciences. The idea was to build the machine learning based classification of malware on top of the Cuckoo Sandbox, test how it can detect unknown malware (to simulate polymorphic or zero-day behavior) and evaluate the accuracy compared to the current signature-based methods.

Specifically, k-Nearest-Neighbors, Decision Trees, Support Vector Machines, Naive Bayes and Random Forest classifiers were evaluated. The dataset used for this study consistsed of the 1156 malware files of 9 families of different types and 984 benign files of various formats. The familes included Dridex, Locky, CTB-Locker, TeslaCrypt, Vawtrak, Zeus, Darkcomet, Cybergate, Xtreme.

If you find the work useful, kindly cite is as:

The amount of requests to share the data used for analysis has been high, but unfortunately it is not possible for me to do this at this point due to restrictions related to its sensitivity.

  • Python 98.6%

Detecting Phishing URLs Using Machine Learning: A Review

  • Conference paper
  • First Online: 20 August 2024
  • Cite this conference paper

machine learning malware detection thesis

  • Kritika Kapse 14 ,
  • Meenu Chawla 14 ,
  • Namita Tiwari 14 &
  • Richa Goenka 14  

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 1001))

Included in the following conference series:

  • International Conference on Deep Learning, Artificial Intelligence and Robotics

The Internet’s explosive expansion has led many people to switch from conventional banking to online banking. Unfortunately, this transition has resulted in cybercrimes such as domain fraud, ransomware, hacking, social engineering, and phishing. Attackers easily use phishing websites to steal delicate personal data because of the Internet’s inherent anonymity, such as passwords and user identities. Deterring these phishing scams is critical for protecting online organisations and individual users. Therefore, the purpose of this study is to investigate and evaluate the current state of the art in detecting phishing URLs using machine learning. Various methods, including feature extraction methods and classification algorithms, were studied. The review discusses limitations and effectiveness evaluation metrics while providing possible improvements. This comprehensive review aims to provide insight into URL-based phishing detection techniques through machine-learning approaches, which promise more robust ways of enhancing online security against fraudulent activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Jain, A.K., Gupta, B.B.: A survey of phishing attack techniques, defence mechanisms and open research challenges. Enterp. Inf. Syst. 16 (4), 527–565 (2022)

Article   Google Scholar  

Basit, A., Zafar, M., Liu, X., Javed, A.R., Jalil, Z., Kifayat, K.: A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun. Syst. 76 , 139–154 (2021)

Anti-Phishing Working Group, Phishing Attack Trends Report - 2nd Quarter (2023). https://docs.apwg.org/reports/apwg_trends_report_q2_2023.pdf

Das, A., Baki, S., El Aassal, A., Verma, R., Dunbar, A.: SoK: a comprehensive reexamination of phishing research from the security perspective. IEEE Commun. Surv. Tutor. 22 (1), 671–708 (2019)

Prakash, P., Kumar, M., Kompella, R.R., Gupta, M.: Phishnet: predictive blacklisting to detect phishing attacks. In: 2010 Proceedings IEEE INFOCOM, pp. 1–5. IEEE (2010)

Google Scholar  

Do, N.Q., Selamat, A., Krejcar, O., Herrera-Viedma, E., Fujita, H.: Deep learning for phishing detection: taxonomy, current challenges and future directions. IEEE Access 10 , 36429–36463 (2022)

Zuraiq, A.A., Alkasassbeh, M.: Phishing detection approaches. In: 2019 2nd International Conference on new Trends in Computing Sciences (ICTCS), pp. 1–6. IEEE (2019)

Aljofey, A., Jiang, Q., Qu, Q., Huang, M., Niyigena, J.P.: An effective phishing detection model based on character level convolutional neural network from URL. Electronics 9 (9), 1514 (2020)

Sahoo, D., Liu, C., Hoi, S. C.: Malicious URL detection using machine learning: a survey. arXiv preprint arXiv:1701.07179 (2017)

Gupta, B.B., Tewari, A., Jain, A.K., Agrawal, D.P.: Fighting against phishing attacks: state of the art and future challenges. Neural Comput. Appl. 28 , 3629–3654 (2017)

Feng, J., Zou, L., Nan, T.: A phishing webpage detection method based on stacked autoencoder and correlation coefficients. J. Comput. Inf. Technol. 27 (2), 41–54 (2019)

Jain, A.K., Gupta, B.B.: Towards detection of phishing websites on client-side using machine learning based approach. Telecommun. Syst. 68 , 687–700 (2018)

Mahajan, R., Siddavatam, I.: Phishing website detection using machine learning algorithms. Int. J. Comput. Appl. 181 (23), 45–47 (2018)

Alswailem, A., Alabdullah, B., Alrumayh, N., Alsedrani, A.: Detecting phishing websites using machine learning. In: 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), pp. 1–6. IEEE (2019)

Sahingoz, O.K., Buber, E., Demir, O., Diri, B.: Machine learning based phishing detection from URLs. Expert Syst. Appl. 117 , 345–357 (2019)

Gandotra, E., Gupta, D.: Improving spoofed website detection using machine learning. Cybern. Syst. 52 (2), 169–190 (2021)

Alam, M.N., Sarma, D., Lima, F.F., Saha, I., Hossain, S.: Phishing attacks detection using machine learning approach. In: 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 1173–1179. IEEE (2020)

Kumar, J., Santhanavijayan, A., Janet, B., Rajendran, B., Bindhumadhava, B.S.: Phishing website classification and detection using machine learning. In: 2020 International Conference on Computer Communication and Informatics (ICCCI), pp. 1–6. IEEE (2020)

Sánchez-Paniagua, M., Fernández, E.F., Alegre, E., Al-Nabki, W., Gonzalez-Castro, V.: Phishing URL detection: a real-case scenario through login URLs. IEEE Access 10 , 42949–42960 (2022)

Jagadeesan, S., Chaturvedi, A., Kumar, S.: URL phishing analysis using random forest. Int. J. Pure Appl. Math. 118 (20), 4159–4163 (2018)

Mahdavifar, S., Ghorbani, A.A.: Application of deep learning to cybersecurity: a survey. Neurocomputing 347 , 149–176 (2019)

Jalil, S., Usman, M.: A review of phishing URL detection using machine learning classifiers. In: Intelligent Systems and Applications: Proceedings of the 2020 Intelligent Systems Conference (IntelliSys), vol. 2, pp. 646–665. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-030-55187-2_47

Abbasi, A., Dobolyi, D., Vance, A., Zahedi, F.M.: The phishing funnel model: a design artifact to predict user susceptibility to phishing websites. Inf. Syst. Res. 32 (2), 410–436 (2021)

Robic-Butez, P., Win, T.Y.: Detection of phishing websites using generative adversarial network. In: 2019 IEEE International Conference on Big Data (Big Data), pp. 3216–3221. IEEE (2019)

Ahmad, R., Alsmadi, I.: Machine learning approaches to IoT security: a systematic literature review. Internet of Things 14 , 100365 (2021)

Download references

Author information

Authors and affiliations.

Department of Computer Science and Engineering, MANIT, Bhopal, India

Kritika Kapse, Meenu Chawla, Namita Tiwari & Richa Goenka

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Kritika Kapse .

Editor information

Editors and affiliations.

UNHCR, Geneva, Switzerland

David Pastor-Escuredo

Emlyon Business School, Écully, France

Imene Brigui

Department of Computer Science, Central University of Rajasthan, Tehsil Kishangarh, Rajasthan, India

Nishtha Kesswani

National Institute of Technology Mizoram, Mizoram, India

Sushanta Bordoloi

NERIST, North Eastern Regional Institute of Science and Technology, Nirjuli, India

Ashok Kumar Ray

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper.

Kapse, K., Chawla, M., Tiwari, N., Goenka, R. (2024). Detecting Phishing URLs Using Machine Learning: A Review. In: Pastor-Escuredo, D., Brigui, I., Kesswani, N., Bordoloi, S., Ray, A.K. (eds) The Future of Artificial Intelligence and Robotics. ICDLAIR 2023. Lecture Notes in Networks and Systems, vol 1001. Springer, Cham. https://doi.org/10.1007/978-3-031-60935-0_24

Download citation

DOI : https://doi.org/10.1007/978-3-031-60935-0_24

Published : 20 August 2024

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-60934-3

Online ISBN : 978-3-031-60935-0

eBook Packages : Intelligent Technologies and Robotics Intelligent Technologies and Robotics (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

IMAGES

  1. (PDF) Malware Analysis and Detection Using Machine Learning Algorithms

    machine learning malware detection thesis

  2. Symmetry

    machine learning malware detection thesis

  3. (PDF) IJERT-Integrating Machine Learning in Malware Detection

    machine learning malware detection thesis

  4. (PDF) Machine Learning Algorithm for Malware Detection: Taxonomy

    machine learning malware detection thesis

  5. (PDF) A Review of Android Malware Detection Approaches Based on Machine

    machine learning malware detection thesis

  6. (PDF) MACHINE LEARNING FOR MALWARE DETECTION

    machine learning malware detection thesis

COMMENTS

  1. Improving the Understanding of Malware Using Machine Learning

    approaches on a dataset of 36k unique, unpacked malware binaries. After executing the samples in a controlled sandbox, BCRAFTY uses its dynamic report to extract and gener-alize behavior combinations to detect similar malware samples in the future. Compared to using analyst-defined behaviors alone, BCRAFTY increases the malware detectionTrue

  2. Malware Analysis and Detection Using Machine Learning Algorithms

    Traditional machine learning-based malware detection approaches have a considerable processing time, but may effectively identify newly emerging malware. Feature engineering may become obsolete due to the prevalence of modern machine learning algorithms, such as deep learning. In this study, we examined a variety of malware detection and ...

  3. PDF Machine Learning Methods for Malware Detection And

    This paper discusses the main points and concerns of machine learning-based malware detection, as well as looks for the best feature representation and classification methods. The goal of this project is to develop the proof of concept for the machine learning based malware classification based on Cuckoo Sandbox.

  4. PDF Malware detection using machine learning

    This thesis proposes a novel approach to malware detection by using a machine learning algorithms known as decision tree, random forest and support vector machine to analyze the structures of malicious files. This is a new approach in malware detection as previously, detection was based on behavior, source code, or

  5. Analyzing and comparing the effectiveness of malware detection: A study

    The goal of this thesis is to combine image processing and deep convolution network methods to produce operational and effective ways that can be used to continuously enhance the performance of detecting and classifying malware created over a lengthy period. ... Machine learning -based malware detection on Android devices using behavioral ...

  6. California State University, NORTHRIDGE Malware detection using machine

    3.7. Machine Learning Techniques. The study of using algorithms for data analysis, pattern detection, and the use of these. or subsequent data sampl. prediction and decision making is what is meant by theterm "machine. s may not be beneficial in situations in which the malware in issue make. use ofa method tha.

  7. PDF Machine Learning for malware detection and classification

    system. A malware infection can be disastrous for any organization. It can cripple networks and systems, as well as destroy, delete, corrupt, or exfiltrate sensitive data. In this thesis we explore how machine learning can detect and classify malware threats to prevent further damage in a network.

  8. Static Malware Detection using Deep Neural Networks on Portable Executables

    13] as static-dynamic approach to use machine learning for detecting unknown malware. They proposed analyzing operational codes obtained from disassembly of exe-cutables and analyzing their execution trace to determine malicious intent. Similarly, a dynamic malware detection framework for Android called DroidDolphin managed to achieve 86.1% ...

  9. The rise of machine learning for detection and classification of

    Shabtai et al. (2009) provide a taxonomy for malware detection using machine learning algorithms by reporting some feature types and feature selection techniques used in the literature. They mainly focus on the feature selection techniques (Gain ratio, Fisher score, document frequency, and hierarchical feature selection) and classification algorithms (Artificial Neural Networks, Bayesian ...

  10. (PDF) Malware Detection using Machine Learning

    This provided the mo tivation to crea te a. malware detection system using machine learn ing. that is well trained and h as a high accuracy and low. positive rate using machine learning that can ...

  11. Improving the Understanding of Malware using Machine Learning

    Theses and Dissertations. Improving the Understanding of Malware using Machine Learning. When a security organization receives a sample (whether it be a binary, script, etc.) from their customers, their goal is to determine if it is malicious or benign. Because samples can be received in large volumes, automated triage and analysis is required ...

  12. Malware Detection using Machine Learning and Deep Learning

    The focus of this tutorial is to present our work on detecting malware with 1) various machine learning algorithms and 2) deep learning models. Our results show that the Random Forest outperforms Deep Neural Network with opcode frequency as a feature. Also in feature reduction, Deep Auto-Encoders are overkill for the dataset, and elementary ...

  13. A Recent Research on Malware Detection Using Machine Learning Algorithm

    This paper is devoted to reviewing the most up-to-date research works from 2017 to 2021 on malware detection where machine learning algorithm including K-Means, Decision Tree, Meta-Heuristic, Naïve Bayes, Neuro-fuzzy, Bayesian, Gaussian, Support Vector Machine (SVM), K-Nearest Neighbour (KNN) and n-Grams was discovered using a systematic ...

  14. PDF An Evaluation of Graph Representation of Programs for Malware Detection

    The scope of this thesis is to evaluate graph-based machine learning methods for malware detection and categorization using di erent types of graph representations generated from a binary executable. The work done in this thesis leverages both supervised and unsupervised machine learning methods. The graph embeddings are generated using

  15. PDF Machine Learning and Images for Malware Detection and Classification

    Advanced Static Analysis proposes the method of reverse engineering. It is the way of revealing malware's binary and assembly language by feeding the binary into a disassem-bler, decompiler, and debugger and looking at binary's source code and assembly code to find out services and activities of the executable.

  16. (PDF) Malware detection using machine learning

    Malware Detection Using Machine Learning Dragos ¸ Gavrilut ¸ 1 , 2 , Mihai Cimpoes ¸u 1 , 2 , Dan Anton 1 , 2 , Liviu Ciortuz 1 1 - Faculty of Computer Science, "Al. I. Cuza" University of ...

  17. PDF Adapting to Concept Drift in Malware Detection

    Therefore, methods are required for adapting to this concept drift in malware detection. In this thesis, we compare three di erent methods called retrain, threshold, ... When applying machine learning to malware detection, we must consider that both malware and clean les change over time as new types of software are constantly being created [27 ...

  18. Deep Learning Techniques for Malware Detection

    In the early 2000s, machine learning methods began to be applied to malware detection, offering improvements over traditional techniques. Studies explored various classifiers,

  19. Thesis

    Deep Learning is a subfield of Machine Learning that relates to structuring algorithms in layers to mimic human neural network. The artificial neural network is used to solve complex problems using different algorithms.In this dissertation, firstly, a systematic review is presented to amalgamate current approaches for detecting Android malware ...

  20. RIT Scholar Works

    RIT Scholar Works | Rochester Institute of Technology Research

  21. Malware detection using machine learning

    Masters Thesis Malware detection using machine learning. It is highly important to detect a file if there is any malware is present or not. Due to increase in malware, a lot of problems are created and companies are losing their important data and facing various problems. The next point is that malware can easily create a lot of damage to the ...

  22. Machine Learning Methods for Malware Detection and Classification

    That is why the need for machine learning-based detection arises. The purpose of this work was to determine the best feature extraction, feature representation, and classification methods that result in the best accuracy when used on the top of Cuckoo Sandbox. Specifically, k-Nearest-Neighbors, Decision Trees, Support Vector Machines, Naive ...

  23. PDF Malware Detection via Machine Learning

    The term malware was first used by Yisrael Radai in 1990 [27], before then malicious software was referred to as computer viruses, a notion which was first formalized by Cohen in 1983 [28]. Given term computer virus predates the term malware, it is not uncommon to see both terms used interchangeably.

  24. Bachelor Thesis for XAMK

    This project is my final work for the Bachelor of Engineering degree in South-Eastern Finland University of APplied Sciences. The idea was to build the machine learning based classification of malware on top of the Cuckoo Sandbox, test how it can detect unknown malware (to simulate polymorphic or zero-day behavior) and evaluate the accuracy compared to the current signature-based methods.

  25. Detecting Phishing URLs Using Machine Learning: A Review

    Machine learning algorithms offer substantial potential for improving phishing detection from malicious URLs in the future. Areas of inquiry and development moving forward might include: 4.1 Improved Feature Extraction and Selection. Enhancing the extraction and selection of features is vital to improving phishing detection through machine ...

  26. Neural network (machine learning)

    In machine learning, a neural network (also artificial neural network or neural net, abbreviated ANN or NN) is a model inspired by the structure and function of biological neural networks in animal brains. [1] [2]An ANN consists of connected units or nodes called artificial neurons, which loosely model the neurons in the brain. These are connected by edges, which model the synapses in the brain.