anomaly-based malware detection

20
ANOMALY-BASED MALWARE DETECTION

Upload: others

Post on 03-May-2022

11 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Anomaly-BaseD Malware detection

A N O M A LY- B A S E D M A LWA R E D E T E C T I O N

Page 2: Anomaly-BaseD Malware detection

W H AT I S A N I D S ?

Presenter
Presentation Notes
And its security software that detects suspicious traffic on a network
Page 3: Anomaly-BaseD Malware detection

A N I D S WO R K S A L O N G S I D E F I R E WA L L S

https://latesthackingnews.com/wp-content/uploads/2017/09/IDS.png

Page 4: Anomaly-BaseD Malware detection

https://miro.medium.com/max/2450/1*XOmaFChbyICBDaC8GwIHsg.png

Page 5: Anomaly-BaseD Malware detection

W H Y A N O M A LY- B A S E D I D S ?

Presenter
Presentation Notes
Zero-day attacks
Page 6: Anomaly-BaseD Malware detection

I M P ROV I N G A N O M A LY – B A S E D I D S

D E T E C T I O N W I T H M AC H I N E L E A R N I N G

Presenter
Presentation Notes
As deep learning gets more robust, we get better IDS
Page 7: Anomaly-BaseD Malware detection

M Y C A P S TO N EP RO J E C T

Presenter
Presentation Notes
Outline of project. I performed…
Page 8: Anomaly-BaseD Malware detection

T H E DATA S E T

Page 9: Anomaly-BaseD Malware detection

DATA P R E PA R AT I O N

Normal Vs Anomaly

Presenter
Presentation Notes
Consolidate into a binary classification.
Page 10: Anomaly-BaseD Malware detection

O R I G I N A L M U LT I C L A S S L A B E L

Page 11: Anomaly-BaseD Malware detection

TO B I N A RY & DATA B A L A N C E

Balancing data maximizes accuracy.

Used Down-sampling method.

Before Down-Sampling:

0 10317691

1 1339841

After Down-Sampling

1 1339841

0 1339841

Page 12: Anomaly-BaseD Malware detection

M L L E A R N I N G E N V I RO N M E N T: AW S S AG E M A K E R

Presenter
Presentation Notes
For my machine learning environment I chose
Page 13: Anomaly-BaseD Malware detection

L E A R N I N G P RO C E S S

1.

2.

3.

4.

5.

6.

7.

Page 14: Anomaly-BaseD Malware detection

A L G O R I T H M S U S E D

Page 15: Anomaly-BaseD Malware detection

R E S U L T S

Page 16: Anomaly-BaseD Malware detection

F 1 - S C O R E

Page 17: Anomaly-BaseD Malware detection

R E S U L T S ( C N T ’ D … )

Page 18: Anomaly-BaseD Malware detection

C O N C L U S I O N

Page 19: Anomaly-BaseD Malware detection

C O D E , B E S T M O D E L F I L E , & J U P Y T E R

N OT E B O O K S :

(Including this presentation)

Page 20: Anomaly-BaseD Malware detection