SlideShare a Scribd company logo
Anti malware solution using Machine Learning
Anti-Malware using ML
 Enough of Machine Learning techniques….
Let’s Start Machine Learning in Cyber Security !
 We will build a Machine Learning based Anti-malware
solution by using classification model.
 Aim would be to identify whether a given binary is
legitimate or malicious.
 Our dataset consists of n number of entries of
executables(exe) and its properties.
 These exe will be malware executable as well as legitimate
windows exe files.
Malwares
Anti-Malware using ML
 Traditional AV or anti malware solution works on
signatures.
 Polymorphic malware bypass these traditional
detection solutions.
 Malware detection is a classification problem.
 Machine learning learns the dataset and then based on
its learning, It predicts : malware/not malware.
 Supply more and more latest dataset to improve
machine learning model performance.
Anti-Malware using ML
 1st Step – Feature extraction from binaries (PE
Parameters) using pefile.
 2nd Step – Feature selection to identify independent
variables which will be relevant.
 3rd Step – Selection of Classification machine learning
model.
 4th Step – Just run a .py file which will extract the
parameters from exe file and predict the output.
Anti-Malware using ML
Let’s Begin Machine Learning!
Demo is available on Youtube:-
https://www.youtube.com/watch?v=Kf9VD1os_pY&index=58&list=PL2iM-
fIRjbTBFazzQ5uEzeASpmP8o40y1
Anti-Malware using ML - Conclusion
 All the python scripts and datasets for each part are
available at my github account:-
 https://github.com/akky2892
THANK YOU !!

More Related Content

PPTX
Threat hunting in cyber world
PPTX
Threat hunting for Beginners
PPT
Malware analysis on android using supervised machine learning techniques
PDF
CTI ANT: Hunting for Chinese Threat Intelligence
PPTX
Malware Detection Using Machine Learning Techniques
PDF
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
PPTX
Cognitive Computing in Security with AI
PDF
SIEM and Threat Hunting
Threat hunting in cyber world
Threat hunting for Beginners
Malware analysis on android using supervised machine learning techniques
CTI ANT: Hunting for Chinese Threat Intelligence
Malware Detection Using Machine Learning Techniques
"Быстрое обнаружение вредоносного ПО для Android с помощью машинного обучения...
Cognitive Computing in Security with AI
SIEM and Threat Hunting

What's hot (20)

PPTX
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
PPTX
Threat hunting and achieving security maturity
PPTX
Threat Hunting 101: Intro to Threat Detection and Incident Response
PDF
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
ODP
Malware Dectection Using Machine learning
PDF
IRJET- Android Malware Detection using Machine Learning
PDF
Detecting Unknown Attacks Using Big Data Analysis
PDF
Threat Hunting Procedures and Measurement Matrice
PPTX
Cyber Threat Hunting Training (CCTHP)
PDF
Malware detection-using-machine-learning
PDF
AI approach to malware similarity analysis: Maping the malware genome with a...
PPTX
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
PDF
Machine Learning in Malware Detection
PDF
A tale story of building and maturing threat hunting program
PPTX
Information Security Awareness
DOCX
robust malware detection for iot devices using deep eigen space learning
PPTX
Cyber Threat Hunting Workshop
PDF
Malware Detection - A Machine Learning Perspective
PPTX
Ethical Hacking Conference 2015- Building Secure Products -a perspective
PDF
Anti evasion and evader - klaus majewski
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Threat hunting and achieving security maturity
Threat Hunting 101: Intro to Threat Detection and Incident Response
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
Malware Dectection Using Machine learning
IRJET- Android Malware Detection using Machine Learning
Detecting Unknown Attacks Using Big Data Analysis
Threat Hunting Procedures and Measurement Matrice
Cyber Threat Hunting Training (CCTHP)
Malware detection-using-machine-learning
AI approach to malware similarity analysis: Maping the malware genome with a...
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
Machine Learning in Malware Detection
A tale story of building and maturing threat hunting program
Information Security Awareness
robust malware detection for iot devices using deep eigen space learning
Cyber Threat Hunting Workshop
Malware Detection - A Machine Learning Perspective
Ethical Hacking Conference 2015- Building Secure Products -a perspective
Anti evasion and evader - klaus majewski
Ad

Similar to Anti malware solution using Machine Learning (20)

PDF
Zero day malware detection
PDF
Classification of Malware based on Data Mining Approach
DOCX
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
PDF
Cyber Defense Forensic Analyst - Real World Hands-on Examples
PDF
A44090104
PDF
Application of data mining based malicious code detection techniques for dete...
PDF
Are current antivirus programs able to detect complex metamorphic malware an ...
PPTX
Pindroid - Android Malware Detection Tool
PDF
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
PDF
IRJET- Android Malware Detection using Deep Learning
PDF
proposal
PPTX
Presentation (1).pptx
PPTX
Presentation.pptx..................................
PPTX
PDF
Design and Development of an Efficient Malware Detection Using ML
PDF
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
PDF
[IJET-V1I6P6] Authors: Ms. Neeta D. Birajdar, Mr. Madhav N. Dhuppe, Ms. Trupt...
PPTX
Malware Detection By Machine Learning Presentation.pptx
DOCX
Malware Protection Week5Part4-IS Revision Fall2013 .docx
PDF
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
Zero day malware detection
Classification of Malware based on Data Mining Approach
Automated Android Malware Detection Using Optimal Ensemble Learning Approach ...
Cyber Defense Forensic Analyst - Real World Hands-on Examples
A44090104
Application of data mining based malicious code detection techniques for dete...
Are current antivirus programs able to detect complex metamorphic malware an ...
Pindroid - Android Malware Detection Tool
Selecting Prominent API Calls and Labeling Malicious Samples for Effective Ma...
IRJET- Android Malware Detection using Deep Learning
proposal
Presentation (1).pptx
Presentation.pptx..................................
Design and Development of an Efficient Malware Detection Using ML
Unveiling the Shadows: A Comprehensive Guide to Malware Analysis for Ensuring...
[IJET-V1I6P6] Authors: Ms. Neeta D. Birajdar, Mr. Madhav N. Dhuppe, Ms. Trupt...
Malware Detection By Machine Learning Presentation.pptx
Malware Protection Week5Part4-IS Revision Fall2013 .docx
A STATIC MALWARE DETECTION SYSTEM USING DATA MINING METHODS
Ad

Recently uploaded (20)

PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT
Mechanical Engineering MATERIALS Selection
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
additive manufacturing of ss316l using mig welding
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT
Project quality management in manufacturing
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PDF
Well-logging-methods_new................
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
OOP with Java - Java Introduction (Basics)
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Mechanical Engineering MATERIALS Selection
CH1 Production IntroductoryConcepts.pptx
additive manufacturing of ss316l using mig welding
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
Project quality management in manufacturing
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
R24 SURVEYING LAB MANUAL for civil enggi
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
Well-logging-methods_new................
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx

Anti malware solution using Machine Learning

  • 2. Anti-Malware using ML  Enough of Machine Learning techniques…. Let’s Start Machine Learning in Cyber Security !  We will build a Machine Learning based Anti-malware solution by using classification model.  Aim would be to identify whether a given binary is legitimate or malicious.  Our dataset consists of n number of entries of executables(exe) and its properties.  These exe will be malware executable as well as legitimate windows exe files.
  • 4. Anti-Malware using ML  Traditional AV or anti malware solution works on signatures.  Polymorphic malware bypass these traditional detection solutions.  Malware detection is a classification problem.  Machine learning learns the dataset and then based on its learning, It predicts : malware/not malware.  Supply more and more latest dataset to improve machine learning model performance.
  • 5. Anti-Malware using ML  1st Step – Feature extraction from binaries (PE Parameters) using pefile.  2nd Step – Feature selection to identify independent variables which will be relevant.  3rd Step – Selection of Classification machine learning model.  4th Step – Just run a .py file which will extract the parameters from exe file and predict the output.
  • 6. Anti-Malware using ML Let’s Begin Machine Learning! Demo is available on Youtube:- https://www.youtube.com/watch?v=Kf9VD1os_pY&index=58&list=PL2iM- fIRjbTBFazzQ5uEzeASpmP8o40y1
  • 7. Anti-Malware using ML - Conclusion  All the python scripts and datasets for each part are available at my github account:-  https://github.com/akky2892 THANK YOU !!