{"created":"2020-09-01T14:49:04.963415+00:00","id":4444,"links":{},"metadata":{"_buckets":{"deposit":"b7b9e745-d6da-4b0f-ab52-64ac7a297936"},"_deposit":{"id":"4444","owners":[],"pid":{"revision_id":0,"type":"recid","value":"4444"},"status":"published"},"_oai":{"id":"oai:meral.edu.mm:recid/4444","sets":["1582963302567:1597824322519"]},"communities":["ucsy"],"item_1583103067471":{"attribute_name":"Title","attribute_value_mlt":[{"subitem_1551255647225":"Effective Malicious Features Extraction and Classification for Incident Handling Systems","subitem_1551255648112":"en_US"}]},"item_1583103085720":{"attribute_name":"Description","attribute_value_mlt":[{"interim":"Each and every day, malicious software writers continue to create new variants,new innovation, new infection, and more obfuscated malware by using packing andencrypting techniques. Malicious software classification and detection play animportant role and a big challenge for cyber security research. Due to the increasingrate of false alarm, the accurate classification and detection of malware is a bignecessity issue to be solved.This research provides the classification system to differentiate malware frombenign and classify malicious types. This research contributes the Malicious SampleNames Extraction (MSNE) procedure and Naming Malicious Samples using theRegular Expression (NMS_RE) technique have been contributed to label the malicioussamples. This research also contributes the prominent Malware Feature ExtractionAlgorithm (MFEA) to point out the dominant features based on the generated reportfiles. The features are API, DLL, and PROCESS called by malicious and benignexecutables through automated analysis. During the experiments, data cleansing forextracted raw data, applying the n-gram technique, and representing and preparing themalicious dataset have been performed to provide the malware classification system.This research work makes use of two malicious datasets for malwareclassification. The Benign Malware Classification (BMC) dataset is used for binaryclass classification system to identify malicious or not and Benign Malware FamilyClassification (BMFC) dataset is used for multi-class classification system to identifymalware family. Chi-Square and Principal Component Analysis (PCA) featureselection methods have been applied in this system to select the best features.Classification algorithms like k-Nearest Neighbor (kNN), Random Forest (RF) andSupport Vector Classification (SVC) have been used for multi-class and binary classclassification. The proposed approach is able to classify the malicious and benignexecutable files effectively.This research work provides malware classification using Machine Learning(ML) classifiers. The findings from the experiment prove that the extracted API_DLLfeatures provide the best evaluation metrics in terms of accuracy, confusion matrix(CM), True Positive Rate (TPR), False Positive Rate (FPR), and Receiver OperatingCharacteristic (ROC) curve area."}]},"item_1583103108160":{"attribute_name":"Keywords","attribute_value":[]},"item_1583103120197":{"attribute_name":"Files","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_access","date":[{"dateType":"Available","dateValue":"2019-11-13"}],"displaytype":"preview","filename":"ChoChoSan.pdf","filesize":[{"value":"2964 Kb"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"url":"https://meral.edu.mm/record/4444/files/ChoChoSan.pdf"},"version_id":"000bc79f-51ad-4673-bb01-51b909158199"}]},"item_1583103131163":{"attribute_name":"Journal articles","attribute_value_mlt":[{"subitem_issue":"","subitem_journal_title":"","subitem_pages":"","subitem_volume":""}]},"item_1583103147082":{"attribute_name":"Conference papers","attribute_value_mlt":[{"subitem_acronym":"","subitem_c_date":"","subitem_conference_title":"","subitem_part":"","subitem_place":"","subitem_session":"","subitem_website":""}]},"item_1583103211336":{"attribute_name":"Books/reports/chapters","attribute_value_mlt":[{"subitem_book_title":"","subitem_isbn":"","subitem_pages":"","subitem_place":"","subitem_publisher":""}]},"item_1583103233624":{"attribute_name":"Thesis/dissertations","attribute_value_mlt":[{"subitem_awarding_university":"University of Computer Studies, Yangon","subitem_supervisor(s)":[{"subitem_supervisor":""}]}]},"item_1583105942107":{"attribute_name":"Authors","attribute_value_mlt":[{"subitem_authors":[{"subitem_authors_fullname":"San, Cho Cho"}]}]},"item_1583108359239":{"attribute_name":"Upload type","attribute_value_mlt":[{"interim":"Publication"}]},"item_1583108428133":{"attribute_name":"Publication type","attribute_value_mlt":[{"interim":"Thesis"}]},"item_1583159729339":{"attribute_name":"Publication date","attribute_value":"2019-10"},"item_1583159847033":{"attribute_name":"Identifier","attribute_value":"http://onlineresource.ucsy.edu.mm/handle/123456789/2376"},"item_title":"Effective Malicious Features Extraction and Classification for Incident Handling Systems","item_type_id":"21","owner":"1","path":["1597824322519"],"publish_date":"2019-11-13","publish_status":"0","recid":"4444","relation_version_is_last":true,"title":["Effective Malicious Features Extraction and Classification for Incident Handling Systems"],"weko_creator_id":"1","weko_shared_id":-1},"updated":"2022-03-24T23:16:16.849884+00:00"}