SlideShare une entreprise Scribd logo
1  sur  8
Télécharger pour lire hors ligne
MALWARE DETECTION:
A FRAMEWORK FOR REVERSE ENGINEERING ANDROID
APPLICATION THROUGH MACHINE LEARNING ALGORITHMS.
PRESENTED BY:
GOLI PALLAVI : 19B41A0529
MARUPAKA SAIPREETHAM : 19B41A0543
AVUSULA HARSHITHA : 19B41A0507
MEKALA SREEKUMAR : 19B41A0546
UNDER THE GUIDANCE OF:
Mr. K.KRISHNA CHAITANYA
ASST.PROF CSE
CONTENTS:
ABSTRACT
EXISTING SYSTEM
DISADVANTAGES
PROPOSED SYSTEM
SYSTEM REQUIREMENTS
CONCLUSION
ABSTRACT:
• Develop a robust framework for detecting malware in
Android applications using reverse engineering
techniques and machine learning algorithms.
• Android : The leading OS in smartphone technology
today.
• Our framework combines the power of machine
learning algorithms with reverse engineered
features to address this issue.
• By training the system on a large dataset of known
malware and benign applications.
• The results show a high detection rate (96.24%) with
a low false positive rate(0.3%).
EXISTING SYSTEM:
• Various methods proposed in related research to
improve malware detection in Android
applications.
• Some methods aim to increase accuracy, while
others focus on providing larger datasets or
utilizing different sets of features.
• The authors used the Random Forest algorithm
and introduced the PMDS approach for detecting
malware in Android applications.
• Their experiments demonstrated high accuracy
rates(94%) in detecting malware samples, and
PMDS proved effective in identifying previously
unknown malware with low false positive rates.
DISADVANTAGES:
• Considers requested permissions as
behavioral markers for detecting
potentially dangerous behavior in
unknown apps.
• The system is not implemented
Machine Learning Algorithm and
Ensemble Learning.
• The system is not implemented
Reverse Engineered Applications
characteristics.
PROPOSED
SYSTEM:
• we developed a new set of features
to detectAndroid malware, which
we tested on a large dataset.
• The results showed significantly
improved accuracy and a low false-
positive rate
• Our model is trained on the latest
malware samples, including the
most recent Android version.
SYSTEM REQUIREMENTS:
HARDWAREREQUIREMENTS:
• Processor : Pentium-IV.
• Ram : 4GB(min).
• Hard Disk : 20GB.
• Keyboard : Standard Windows Keyboard.
• Monitor : SVGA.
SOFTWAREREQUIREMENTS:
• Operating system : Windows 7 Ultimate.
• Coding Language : Python.
• Front-End : Python.
• Back-End : Django-ORM
• Designing : Html, CSS, JavaScript.
• Data Base : MySQL (WAMP Server).
CONCLUSION:
• Our framework presents an innovative approach to detecting malware in Android applications
using machine learning algorithms
• We offer an efficient solution aiming to safeguard user privacy and device integrity.

Contenu connexe

Tendances

GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION
Ashok Mannai
 
Metric Learning Survey Slides
Metric Learning Survey SlidesMetric Learning Survey Slides
Metric Learning Survey Slides
guestd8baf6
 
09 heuristic search
09 heuristic search09 heuristic search
09 heuristic search
Tianlu Wang
 
Inference in Bayesian Networks
Inference in Bayesian NetworksInference in Bayesian Networks
Inference in Bayesian Networks
guestfee8698
 

Tendances (20)

GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION GRID COMPUTING PRESENTATION
GRID COMPUTING PRESENTATION
 
셸 스크립트를 이용한 클라우드 시스템 운영
셸 스크립트를 이용한 클라우드 시스템 운영셸 스크립트를 이용한 클라우드 시스템 운영
셸 스크립트를 이용한 클라우드 시스템 운영
 
EDR vs SIEM - The fight is on
EDR vs SIEM - The fight is onEDR vs SIEM - The fight is on
EDR vs SIEM - The fight is on
 
Modernizing legacy systems
Modernizing legacy systemsModernizing legacy systems
Modernizing legacy systems
 
Edge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesisEdge Computing Platforms and Protocols - Ph.D. thesis
Edge Computing Platforms and Protocols - Ph.D. thesis
 
An Introduction to OpenStack Heat
An Introduction to OpenStack HeatAn Introduction to OpenStack Heat
An Introduction to OpenStack Heat
 
CISSP - Chapter 3 - System security architecture
CISSP - Chapter 3  - System security architectureCISSP - Chapter 3  - System security architecture
CISSP - Chapter 3 - System security architecture
 
Photo-realistic Single Image Super-resolution using a Generative Adversarial ...
Photo-realistic Single Image Super-resolution using a Generative Adversarial ...Photo-realistic Single Image Super-resolution using a Generative Adversarial ...
Photo-realistic Single Image Super-resolution using a Generative Adversarial ...
 
Comparison of existing cni plugins for kubernetes
Comparison of existing cni plugins for kubernetesComparison of existing cni plugins for kubernetes
Comparison of existing cni plugins for kubernetes
 
Metric Learning Survey Slides
Metric Learning Survey SlidesMetric Learning Survey Slides
Metric Learning Survey Slides
 
Virtualization Questions
Virtualization QuestionsVirtualization Questions
Virtualization Questions
 
Observability: Beyond the Three Pillars with Spring
Observability: Beyond the Three Pillars with SpringObservability: Beyond the Three Pillars with Spring
Observability: Beyond the Three Pillars with Spring
 
Bayes Classification
Bayes ClassificationBayes Classification
Bayes Classification
 
Intro to AI STRIPS Planning & Applications in Video-games Lecture3-Part1
Intro to AI STRIPS Planning & Applications in Video-games Lecture3-Part1Intro to AI STRIPS Planning & Applications in Video-games Lecture3-Part1
Intro to AI STRIPS Planning & Applications in Video-games Lecture3-Part1
 
09 heuristic search
09 heuristic search09 heuristic search
09 heuristic search
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Multi scale dense networks
Multi scale dense networksMulti scale dense networks
Multi scale dense networks
 
Ensuring Kubernetes Cost Efficiency across (many) Clusters - DevOps Gathering...
Ensuring Kubernetes Cost Efficiency across (many) Clusters - DevOps Gathering...Ensuring Kubernetes Cost Efficiency across (many) Clusters - DevOps Gathering...
Ensuring Kubernetes Cost Efficiency across (many) Clusters - DevOps Gathering...
 
Chapter 5 - Identity Management
Chapter 5 - Identity ManagementChapter 5 - Identity Management
Chapter 5 - Identity Management
 
Inference in Bayesian Networks
Inference in Bayesian NetworksInference in Bayesian Networks
Inference in Bayesian Networks
 

Similaire à malware detection-machine learning-reverse engineered.ppt

A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...
Mahmoud Hammad
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Phil Agcaoili
 
malware detection ppt for vtu project and other final year project
malware detection ppt for vtu project and other final year projectmalware detection ppt for vtu project and other final year project
malware detection ppt for vtu project and other final year project
NaveenAd4
 

Similaire à malware detection-machine learning-reverse engineered.ppt (20)

Design and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using MLDesign and Development of an Efficient Malware Detection Using ML
Design and Development of an Efficient Malware Detection Using ML
 
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...
A Large-Scale Empirical Study on the Effects of Code Obfuscations on Android ...
 
ppt for mini project .pptx
ppt for mini project .pptxppt for mini project .pptx
ppt for mini project .pptx
 
Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation A...
Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation A...Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation A...
Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation A...
 
Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...Good Security Starts with Software Assurance - Software Assurance Market Plac...
Good Security Starts with Software Assurance - Software Assurance Market Plac...
 
MINI PROJECT s.pptx
MINI PROJECT s.pptxMINI PROJECT s.pptx
MINI PROJECT s.pptx
 
Face recognition using arm 7
Face recognition using arm 7Face recognition using arm 7
Face recognition using arm 7
 
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
PROVIDING CYBER SECURITY SOLUTION FOR MALWARE DETECTION USING SUPPORT VECTOR ...
 
Foutse_Khomh.pptx
Foutse_Khomh.pptxFoutse_Khomh.pptx
Foutse_Khomh.pptx
 
Generating Risk Summary Risk Scores For Mobile Applications
Generating Risk Summary Risk Scores For Mobile ApplicationsGenerating Risk Summary Risk Scores For Mobile Applications
Generating Risk Summary Risk Scores For Mobile Applications
 
SE2018_Lec 19_ Software Testing
SE2018_Lec 19_ Software TestingSE2018_Lec 19_ Software Testing
SE2018_Lec 19_ Software Testing
 
A malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learningA malware detection method for health sensor data based on machine learning
A malware detection method for health sensor data based on machine learning
 
Apeman masta midih-oc2_demo_day
Apeman masta midih-oc2_demo_dayApeman masta midih-oc2_demo_day
Apeman masta midih-oc2_demo_day
 
malware detection ppt for vtu project and other final year project
malware detection ppt for vtu project and other final year projectmalware detection ppt for vtu project and other final year project
malware detection ppt for vtu project and other final year project
 
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROIDMACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
MACHINE LEARNING APPROACH TO LEARN AND DETECT MALWARE IN ANDROID
 
Predict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptxPredict Android ransomware using categorical classifiaction.pptx
Predict Android ransomware using categorical classifiaction.pptx
 
CV
CVCV
CV
 
ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)ASIP (Application-specific instruction-set processor)
ASIP (Application-specific instruction-set processor)
 
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
 
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMSDETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
 

Dernier

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Dernier (8)

Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
9999266834 Call Girls In Noida Sector 52 (Delhi) Call Girl Service
 
Leading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdfLeading Mobile App Development Companies in India (2).pdf
Leading Mobile App Development Companies in India (2).pdf
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...
Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...
Thane 💋 Call Girls 7738631006 💋 Call Girls in Thane Escort service book now. ...
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 

malware detection-machine learning-reverse engineered.ppt

  • 1. MALWARE DETECTION: A FRAMEWORK FOR REVERSE ENGINEERING ANDROID APPLICATION THROUGH MACHINE LEARNING ALGORITHMS. PRESENTED BY: GOLI PALLAVI : 19B41A0529 MARUPAKA SAIPREETHAM : 19B41A0543 AVUSULA HARSHITHA : 19B41A0507 MEKALA SREEKUMAR : 19B41A0546 UNDER THE GUIDANCE OF: Mr. K.KRISHNA CHAITANYA ASST.PROF CSE
  • 3. ABSTRACT: • Develop a robust framework for detecting malware in Android applications using reverse engineering techniques and machine learning algorithms. • Android : The leading OS in smartphone technology today. • Our framework combines the power of machine learning algorithms with reverse engineered features to address this issue. • By training the system on a large dataset of known malware and benign applications. • The results show a high detection rate (96.24%) with a low false positive rate(0.3%).
  • 4. EXISTING SYSTEM: • Various methods proposed in related research to improve malware detection in Android applications. • Some methods aim to increase accuracy, while others focus on providing larger datasets or utilizing different sets of features. • The authors used the Random Forest algorithm and introduced the PMDS approach for detecting malware in Android applications. • Their experiments demonstrated high accuracy rates(94%) in detecting malware samples, and PMDS proved effective in identifying previously unknown malware with low false positive rates.
  • 5. DISADVANTAGES: • Considers requested permissions as behavioral markers for detecting potentially dangerous behavior in unknown apps. • The system is not implemented Machine Learning Algorithm and Ensemble Learning. • The system is not implemented Reverse Engineered Applications characteristics.
  • 6. PROPOSED SYSTEM: • we developed a new set of features to detectAndroid malware, which we tested on a large dataset. • The results showed significantly improved accuracy and a low false- positive rate • Our model is trained on the latest malware samples, including the most recent Android version.
  • 7. SYSTEM REQUIREMENTS: HARDWAREREQUIREMENTS: • Processor : Pentium-IV. • Ram : 4GB(min). • Hard Disk : 20GB. • Keyboard : Standard Windows Keyboard. • Monitor : SVGA. SOFTWAREREQUIREMENTS: • Operating system : Windows 7 Ultimate. • Coding Language : Python. • Front-End : Python. • Back-End : Django-ORM • Designing : Html, CSS, JavaScript. • Data Base : MySQL (WAMP Server).
  • 8. CONCLUSION: • Our framework presents an innovative approach to detecting malware in Android applications using machine learning algorithms • We offer an efficient solution aiming to safeguard user privacy and device integrity.