Processing, Please wait...

  • Home
  • About Us
  • Search:
  • Advanced Search

Growing Science » International Journal of Data and Network Science » Customized K-nearest neighbors’ algorithm for malware detection

Journals

  • IJIEC (747)
  • MSL (2643)
  • DSL (668)
  • CCL (508)
  • USCM (1092)
  • ESM (413)
  • AC (562)
  • JPM (271)
  • IJDS (912)
  • JFS (96)
  • HE (32)
  • SCI (26)

IJDS Volumes

    • Volume 1 (8)
      • Issue 1 (5)
      • Issue 2 (3)
    • Volume 2 (12)
      • Issue 1 (3)
      • Issue 2 (3)
      • Issue 3 (3)
      • Issue 4 (3)
    • Volume 3 (27)
      • Issue 1 (4)
      • Issue 2 (9)
      • Issue 3 (8)
      • Issue 4 (6)
    • Volume 4 (37)
      • Issue 1 (6)
      • Issue 2 (15)
      • Issue 3 (7)
      • Issue 4 (9)
    • Volume 5 (86)
      • Issue 1 (9)
      • Issue 2 (11)
      • Issue 3 (32)
      • Issue 4 (34)
    • Volume 6 (163)
      • Issue 1 (30)
      • Issue 2 (33)
      • Issue 3 (40)
      • Issue 4 (60)
    • Volume 7 (200)
      • Issue 1 (53)
      • Issue 2 (46)
      • Issue 3 (46)
      • Issue 4 (55)
    • Volume 8 (243)
      • Issue 1 (60)
      • Issue 2 (61)
      • Issue 3 (60)
      • Issue 4 (62)
    • Volume 9 (96)
      • Issue 1 (20)
      • Issue 2 (6)
      • Issue 3 (30)
      • Issue 4 (40)
    • Volume 10 (40)
      • Issue 1 (40)

Keywords

Supply chain management(166)
Jordan(161)
Vietnam(149)
Customer satisfaction(120)
Performance(113)
Supply chain(111)
Service quality(98)
Competitive advantage(95)
Tehran Stock Exchange(94)
SMEs(87)
optimization(86)
Trust(83)
TOPSIS(83)
Financial performance(83)
Sustainability(82)
Job satisfaction(80)
Factor analysis(78)
Social media(78)
Artificial intelligence(77)
Knowledge Management(77)


» Show all keywords

Authors

Naser Azad(82)
Mohammad Reza Iravani(64)
Zeplin Jiwa Husada Tarigan(63)
Endri Endri(45)
Muhammad Alshurideh(42)
Hotlan Siagian(39)
Jumadil Saputra(36)
Dmaithan Almajali(36)
Muhammad Turki Alshurideh(35)
Barween Al Kurdi(32)
Ahmad Makui(32)
Basrowi Basrowi(31)
Hassan Ghodrati(31)
Mohammad Khodaei Valahzaghard(30)
Sautma Ronni Basana(29)
Shankar Chakraborty(29)
Ni Nyoman Kerti Yasa(29)
Sulieman Ibraheem Shelash Al-Hawary(28)
Prasadja Ricardianto(28)
Haitham M. Alzoubi(27)


» Show all authors

Countries

Iran(2184)
Indonesia(1290)
India(788)
Jordan(786)
Vietnam(504)
Saudi Arabia(453)
Malaysia(441)
United Arab Emirates(220)
China(206)
Thailand(153)
United States(111)
Turkey(106)
Ukraine(104)
Egypt(98)
Canada(92)
Peru(88)
Pakistan(85)
United Kingdom(80)
Morocco(79)
Nigeria(78)


» Show all countries

International Journal of Data and Network Science

ISSN 2561-8156 (Online) - ISSN 2561-8148 (Print)
Quarterly Publication
Volume 8 Issue 1 pp. 431-438 , 2024

Customized K-nearest neighbors’ algorithm for malware detection Pages 431-438 Right click to download the paper Download PDF

Authors: Mosleh M. Abualhaj, Ahmad Adel Abu-Shareha, Qusai Y. Shambour, Adeeb Alsaaidah, Sumaya N. Al-Khatib, Mohammed Anbar

DOI: 10.5267/j.ijdns.2023.9.012

Keywords: Machine learning, K-Nearest Neighbors, Malware detection, Distance metric, Cyber-threats

Abstract: The security and integrity of computer systems and networks highly depend on malware detection. In the realm of malware detection, the K-Nearest Neighbors (KNN) algorithm is a well-liked and successful machine learning algorithm. However, the choice of an acceptable distance metric parameter has a significant impact on the KNN algorithm's performance. This study tries to improve malware detection by adjusting the KNN algorithm's distance metric parameter. The distance metric greatly influences the similarity or dissimilarity between instances in the feature space. The KNN algorithm for malware detection can be more accurate and effective by carefully choosing or modifying the distance metric. This paper analyzes multiple distance metrics, including Minkowski distance, Manhattan distance, and Euclidean distance. These metrics account for the traits of malware samples while capturing various aspects of similarity. The effectiveness of the KNN algorithm is evaluated using the MalMem-2022 malware dataset, and the results are broken down into these three-distance metrics. The experimental findings show that, among the three distance metric parameters, the Euclidean and Minkowski distance metric parameters considerably produced the best outcomes with binary classification. While with multiclass classification, the KNN algorithm has achieved the highest outcomes using Manhattan distance.

How to cite this paper
Abualhaj, M., Abu-Shareha, A., Shambour, Q., Alsaaidah, A., Al-Khatib, S & Anbar, M. (2024). Customized K-nearest neighbors’ algorithm for malware detection.International Journal of Data and Network Science, 8(1), 431-438.

Refrences
Abualhaj, M. M., Abu-Shareha, A. A., Hiari, M. O., Alrabanah, Y., Al-Zyoud, M., & Alsharaiah, M. A. (2022). A Para-digm for DoS Attack Disclosure using Machine Learning Techniques. International Journal of Advanced Computer Science and Applications, 13(3).‏
Al Zaabi, A., & Mouheb, D. (2020, November). Android malware detection using static features and machine learning. In 2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI) (pp. 1-5). IEEE.‏
Al-Mimi, H., Hamad, N. A., Abualhaj, M. M., Daoud, M. S., Al-dahoud, A., & Rasmi, M. (2023). An Enhanced Intrusion Detection System for Protecting HTTP Services from Attacks. International Journal of Advances in Soft Computing & Its Applications, 15(2).‏
Alsharaiah, M., Abu-Shareha, A., Abualhaj, M., Baniata, L., Adwan, O., Al-saaidah, A., & Oraiqat, M. (2023). A new phishing-website detection framework using ensemble classification and clustering. International Journal of Data and Network Science, 7(2), 857-864.‏
Alves, T., Das, R., & Morris, T. (2018). Embedding encryption and machine learning intrusion prevention systems on pro-grammable logic controllers. IEEE Embedded Systems Letters, 10(3), 99-102.‏
Belaoued, M., Derhab, A., Mazouzi, S., & Khan, F. A. (2020). MACoMal: A multi-agent based collaborative mechanism for anti-malware assistance. IEEE Access, 8, 14329-14343.‏
Chen, C. W., Su, C. H., Lee, K. W., & Bair, P. H. (2020, February). Malware family classification using active learning by learning. In 2020 22nd International Conference on Advanced Communication Technology (ICACT) (pp. 590-595). IEEE.‏
Choudhary, S., & Sharma, A. (2020, February). Malware detection & classification using machine learning. In 2020 Inter-national Conference on Emerging Trends in Communication, Control and Computing (ICONC3) (pp. 1-4). IEEE.‏
Das, D., & Nanda, S. (2013, December). Securing computer networks by networking multiple OS kernels. Revisting net-work security: protecting computer networks from malwares. In World Congress on Internet Security (WorldCIS-2013) (pp. 95-98). IEEE.‏
Dener, M., Ok, G., & Orman, A. (2022). Malware detection using memory analysis data in big data environment. Applied Sciences, 12(17), 8604.‏
Gao, X., & Li, G. (2020). A KNN model based on manhattan distance to identify the SNARE proteins. Ieee Access, 8, 112922-112931.‏
Hegedus, J., Miche, Y., Ilin, A., & Lendasse, A. (2011, December). Methodology for behavioral-based malware analysis and detection using random projections and k-nearest neighbors classifiers. In 2011 seventh international conference on computational intelligence and security (pp. 1016-1023). IEEE.‏
Jain, P., Rajvaidya, I., Sah, K. K., & Kannan, J. (2022, February). Machine Learning Techniques for Malware Detection-a Research Review. In 2022 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS) (pp. 1-6). IEEE.‏
Kolesnikov, N. (2023). 50+ cybersecurity statistics for 2023 you need to know – where, who & what is targeted. Techope-dia. https://www.techopedia.com/cybersecurity-statistics.
Kolhar, M., Al-Turjman, F., Alameen, A., & Abualhaj, M. M. (2020). A three layered decentralized IoT biometric archi-tecture for city lockdown during COVID-19 outbreak. Ieee Access, 8, 163608-163617.‏
Lei, J., Gao, S., Shi, J., Wei, X., Dong, M., Wang, W., & Han, Z. (2022). A Reinforcement Learning Approach for Defend-ing Against Multiscenario Load Redistribution Attacks. IEEE Transactions on Smart Grid, 13(5), 3711-3722.‏
Ma, C., & Chi, Y. (2022). KNN normalized optimization and platform tuning based on hadoop. IEEE Access, 10, 81406-81433.‏
Maruf, Z. R., & Laksito, A. D. (2020, November). The comparison of distance measurement for optimizing KNN collabo-rative filtering recommender system. In 2020 3rd International Conference on Information and Communications Tech-nology (ICOIACT) (pp. 89-93). IEEE.‏
Peng, W., Li, F., Zou, X., & Wu, J. (2013). Behavioral malware detection in delay tolerant networks. IEEE Transactions on Parallel and Distributed systems, 25(1), 53-63.‏
Qbeitah, M. A., & Aldwairi, M. (2018, April). Dynamic malware analysis of phishing emails. In 2018 9th International Conference on Information and Communication Systems (ICICS) (pp. 18-24). IEEE.‏
Rosmansyah, Y., & Dabarsyah, B. (2015, August). Malware detection on android smartphones using API class and ma-chine learning. In 2015 International Conference on Electrical Engineering and Informatics (ICEEI) (pp. 294-297). IEEE.‏
Sai, M., Tyagi, A., Panda, K., & Kumar, S. (2022, November). Machine learning-based malware detection using stacking of opcodes and bytecode sequences. In 2022 Seventh International Conference on Parallel, Distributed and Grid Com-puting (PDGC) (pp. 204-209). IEEE.‏
Saurabh. (2018, December). Advance malware analysis using static and dynamic methodology. In 2018 International Con-ference on Advanced Computation and Telecommunication (ICACAT) (pp. 1-5). IEEE.‏
Sen, S., Aydogan, E., & Aysan, A. I. (2018). Coevolution of mobile malware and anti-malware. IEEE Transactions on In-formation Forensics and Security, 13(10), 2563-2574.‏
Shi, K., Chen, S., Li, D., Tian, K., & Feng, M. (2022, November). Analysis of the Optimized KNN Algorithm for the Data Security of DR Service. In 2022 IEEE 6th Conference on Energy Internet and Energy System Integration (EI2) (pp. 1634-1637). IEEE.‏
Sonicwall, 2022 sonicwall cyber threat report. https://www.infopoint-security.de/media/2022-sonicwall-cyber-threat-report.pdf
Tirumala, S. S., Valluri, M. R., & Babu, G. A. (2019, January). A survey on cybersecurity awareness concerns, practices and conceptual measures. In 2019 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-6). IEEE.‏
Wu, H., Han, M., Chen, Z., Li, M., & Zhang, X. (2023). A Weighted Ensemble Classification Algorithm Based on Nearest Neighbors for Multi-Label Data Stream. ACM Transactions on Knowledge Discovery from Data, 17(5), 1-21.‏
Yeo, M., Koo, Y., Yoon, Y., Hwang, T., Ryu, J., Song, J., & Park, C. (2018, January). Flow-based malware detection using convolutional neural network. In 2018 International Conference on Information Networking (ICOIN) (pp. 910-913). IEEE.‏
Zhang, S., Li, J., & Li, Y. (2022). Reachable distance function for KNN classification. IEEE Transactions on Knowledge and Data Engineering.‏
  • 68
  • 1
  • 2
  • 3
  • 4
  • 5

Journal: International Journal of Data and Network Science | Year: 2024 | Volume: 8 | Issue: 1 | Views: 1899 | Reviews: 0

Related Articles:
  • Android malicious attacks detection models using machine learning technique ...
  • Botnet attacks detection in IoT environment using machine learning techniqu ...
  • A new phishing-website detection framework using ensemble classification an ...
  • Employing cluster-based class decomposition approach to detect phishing web ...
  • The effect of using honeypot network on system security

Add Reviews

Name:*
E-Mail:
Review:
Bold Italic Underline Strike | Align left Center Align right | Insert smilies Insert link URLInsert protected URL Select color | Add Hidden Text Insert Quote Convert selected text from selection to Cyrillic (Russian) alphabet Insert spoiler
winkwinkedsmileam
belayfeelfellowlaughing
lollovenorecourse
requestsadtonguewassat
cryingwhatbullyangry
Security Code: *
Include security image CAPCHA.
Refresh Code

® 2010-2026 GrowingScience.Com