SlideShare a Scribd company logo
SUPERVISED LEARNING IN
CYBERSECURITY
Ramkrushna M.
Assistant Professor
International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057
Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
Contents
Introduction Motivation Objectives Flow Process ApplicationsImplementation
International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057
Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
Introduction
Cybersecurity:
Cyber Security, it is also called as
information security. It works on three
primary principles integrity,
confidentiality, and availability (ICA) of
information. It contains set ethical tools,
risk management techniques and best
practices created to protect networks,
devices, programs, and data from
unauthorized access.
Malware:
Malware, it is kind of software created to
harm to a computer, server, client, or
computer network. Examples of
Malware's are computer viruses, worms,
Trojan horses, ransomware, spyware.
Motivation
• The technology is moving towards its peak it's
important to protect the information/data from
intruders(Black hat).
• Data is the primary key for any infrastructure so it is
necessary to safeguard the data from theft or any kind
of tampering.
• Here's where cybersecurity comes into the picture to
protect us from any kind of malicious activity.
International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057
Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
Objectives
Malware analysis with the help of ML
and PE header files.
To classify the whether the file is
malicious or not.
To build malware detection application
with the help of ExtraTreeClassifier ,
RandomForestClassifier and PE header
files.
International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057
Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
Flow Process
MALWARE
DETECTION USING
PE HEADERS
Start
Dataset(PE files) ExtraTreeClassifier
RandomForest Output
International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057
Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
Implementation Steps :
• In order to implement machine learning in malware
analysis we have taken the help of tools , pe header files ,
and help of machine learning algorithms such as extra
tree classifier and random forest.
• Here have chosen ExtraTreeClassisfier and Random forest
over other ml algo such as gradient boost .
• The main reason advantage of random forest classifier
over gradient boost is that the random forest create the
multitude of decisssion tree. More the number of tree
better the classification and hence we get a better result.
• Input files----->PE Header
• ML Algorithm->ExtraTreesClassifier / Random Forest
• Find Accurace Ratio
• Classify the Malware
International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057
Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
Portable Executable (PE) File Format
• The Portable Executable (PE) format is a
file format for executables, object code,
and DLLs, used in 32-bit and 64-bit
versions of Windows operating systems.
• The PE file format was defined to
provide the best way for the Windows
Operating System to execute code and
also to store the essential data which is
needed to run a program. Portable
Executable File Format is derived from
the Microsoft Common Object File
Format (COFF).
International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057
Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
Step by Step Classification :
Dataset
(PE files):
PE is file format
for dll,
executables,
object codes for
windows OS.
ExtraTreeClassifier:
Used for optimizing
dataset i.e
Splitting/partitioning
the legitimate and
Non legitimate
dataset
RandomForestClassifier:
Method for classification
by constructing
multitude of decision
tree at training tree
International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057
Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
Applications:
MACHINE LEARNING CAN
PLAY A GREAT ROLE IN
CYBERSECURITY FIELD .HERE
ARE THE SOME APPLICATION
OF MACHINE LEARNING IN
MALWARE .
ML APPLIED IN MALWARE
ANALYSIS HELP US
TO ANALYSIS/CLASSIFIE THE
DIFFERENT TYPE OF
MALWARE.
ML ALONG WITH NEURAL
NETWORK CAN HELP US TO
IDENTIFIY AND CLASSIFIE THR
MALWARE DURING REAL
TIME. SO AS THE
PRECAUTION CAN BE TAKEN
BEFORE IT IS SPREAD/CAUSE
HARM.
ML APPLIED IN DETECTING
THE MALWARE WILL HELP US
TO BUILD BETTER
ANTIVIRUSE THAT WILL GIVE
BETTER PROTECTION THE IT
INFRASTRUCTURE AND ALSO
PEOPLE.
International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057
Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
THANK-YOU
Ramkrushna M.
Assistant Professor
International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057
Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
http://www.isquareit.edu.in/

More Related Content

PPTX
FUSION - Pattern Recognition, Classification, Classifier Fusion
PPTX
PPTX
Difference Between AI(Artificial Intelligence), ML(Machine Learning), DL (Dee...
PPTX
State Pattern: Introduction & Implementation
FUSION - Pattern Recognition, Classification, Classifier Fusion
Difference Between AI(Artificial Intelligence), ML(Machine Learning), DL (Dee...
State Pattern: Introduction & Implementation

What's hot (20)

PPTX
Introduction to Big Data, HADOOP: HDFS, MapReduce
PPTX
Differential Equation - Order Degree
PPTX
Usability Heuristics - Principles & Examples
PPTX
Cloud Computing & Virtual Infrastructure
PPTX
Factor Analysis & The Measurement Model
PPTX
Adapter Pattern: Introduction & Implementation (with examples)
PPTX
Systems Programming & Operating Systems - Overview of LEX-and-YACC
PPTX
Superstructure and it's various components
PPTX
Engineering Mathematics | Maxima and Minima
PPTX
PPTX
Artificial Intelligence - Introduction
Introduction to Big Data, HADOOP: HDFS, MapReduce
Differential Equation - Order Degree
Usability Heuristics - Principles & Examples
Cloud Computing & Virtual Infrastructure
Factor Analysis & The Measurement Model
Adapter Pattern: Introduction & Implementation (with examples)
Systems Programming & Operating Systems - Overview of LEX-and-YACC
Superstructure and it's various components
Engineering Mathematics | Maxima and Minima
Artificial Intelligence - Introduction
Ad

Similar to Supervised Learning in Cybersecurity (20)

PPT
devops dtail education and devops ools which r used
PPT
DevOps Industry Perspective Mr Pradip Ashok Chougule
PPTX
Introduction To Assembly Language Programming
PDF
IRJET- Intelligent Laboratory Management System based on Internet of Thin...
PPTX
PPTX
DOCX
resume _jayendra Kadam
PPTX
PDF
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
PPTX
DAA Introduction to Algorithms & Application
PDF
PDF
According To The Author Of “Build A Streamlined Refinery”,
PDF
IRJET- Biometric Attendance Management System using Raspberry Pi
PPTX
Penetration testing dont just leave it to chance
PDF
Phishing Website Detection Paradigm using XGBoost
PPT
Java as Object Oriented Programming Language
PDF
Automatic Insider Threat Detection in E-mail System using N-gram Technique
devops dtail education and devops ools which r used
DevOps Industry Perspective Mr Pradip Ashok Chougule
Introduction To Assembly Language Programming
IRJET- Intelligent Laboratory Management System based on Internet of Thin...
resume _jayendra Kadam
Study of Software Defect Prediction using Forward Pass RNN with Hyperbolic Ta...
DAA Introduction to Algorithms & Application
According To The Author Of “Build A Streamlined Refinery”,
IRJET- Biometric Attendance Management System using Raspberry Pi
Penetration testing dont just leave it to chance
Phishing Website Detection Paradigm using XGBoost
Java as Object Oriented Programming Language
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Ad

More from International Institute of Information Technology (I²IT) (20)

PPTX
Understanding Natural Language Processing
PPTX
Professional Ethics & Etiquette: What Are They & How Do I Get Them?
PPTX
Writing Skills: Importance of Writing Skills
PPTX
Professional Communication | Introducing Oneself
PPTX
PPTX
What Is Jenkins? Features and How It Works
PPTX
Data Science, Big Data, Data Analytics
PPTX
Sentiment Analysis in Machine Learning
PPT
Importance of Theory of Computations
PPTX
Data Visualization - How to connect Microsoft Forms to Power BI
PPTX
Yoga To Fight & Win Against COVID-19
PPTX
Land Pollution - Causes, Effects & Solution
PPTX
Sampling Theorem and Band Limited Signals
PPTX
Types of Sampling in Analog Communication
PPTX
Pulse Modulation - Classification & Case Study
Understanding Natural Language Processing
Professional Ethics & Etiquette: What Are They & How Do I Get Them?
Writing Skills: Importance of Writing Skills
Professional Communication | Introducing Oneself
What Is Jenkins? Features and How It Works
Data Science, Big Data, Data Analytics
Sentiment Analysis in Machine Learning
Importance of Theory of Computations
Data Visualization - How to connect Microsoft Forms to Power BI
Yoga To Fight & Win Against COVID-19
Land Pollution - Causes, Effects & Solution
Sampling Theorem and Band Limited Signals
Types of Sampling in Analog Communication
Pulse Modulation - Classification & Case Study

Recently uploaded (20)

PDF
Encapsulation theory and applications.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Approach and Philosophy of On baking technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Cloud computing and distributed systems.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation theory and applications.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
Approach and Philosophy of On baking technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
MIND Revenue Release Quarter 2 2025 Press Release
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
20250228 LYD VKU AI Blended-Learning.pptx
cuic standard and advanced reporting.pdf
NewMind AI Weekly Chronicles - August'25 Week I
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
Understanding_Digital_Forensics_Presentation.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectroscopy.pptx food analysis technology
Dropbox Q2 2025 Financial Results & Investor Presentation

Supervised Learning in Cybersecurity

  • 1. SUPERVISED LEARNING IN CYBERSECURITY Ramkrushna M. Assistant Professor International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057 Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
  • 2. Contents Introduction Motivation Objectives Flow Process ApplicationsImplementation International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057 Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
  • 3. Introduction Cybersecurity: Cyber Security, it is also called as information security. It works on three primary principles integrity, confidentiality, and availability (ICA) of information. It contains set ethical tools, risk management techniques and best practices created to protect networks, devices, programs, and data from unauthorized access. Malware: Malware, it is kind of software created to harm to a computer, server, client, or computer network. Examples of Malware's are computer viruses, worms, Trojan horses, ransomware, spyware.
  • 4. Motivation • The technology is moving towards its peak it's important to protect the information/data from intruders(Black hat). • Data is the primary key for any infrastructure so it is necessary to safeguard the data from theft or any kind of tampering. • Here's where cybersecurity comes into the picture to protect us from any kind of malicious activity. International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057 Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
  • 5. Objectives Malware analysis with the help of ML and PE header files. To classify the whether the file is malicious or not. To build malware detection application with the help of ExtraTreeClassifier , RandomForestClassifier and PE header files. International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057 Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
  • 6. Flow Process MALWARE DETECTION USING PE HEADERS Start Dataset(PE files) ExtraTreeClassifier RandomForest Output International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057 Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
  • 7. Implementation Steps : • In order to implement machine learning in malware analysis we have taken the help of tools , pe header files , and help of machine learning algorithms such as extra tree classifier and random forest. • Here have chosen ExtraTreeClassisfier and Random forest over other ml algo such as gradient boost . • The main reason advantage of random forest classifier over gradient boost is that the random forest create the multitude of decisssion tree. More the number of tree better the classification and hence we get a better result. • Input files----->PE Header • ML Algorithm->ExtraTreesClassifier / Random Forest • Find Accurace Ratio • Classify the Malware International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057 Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
  • 8. Portable Executable (PE) File Format • The Portable Executable (PE) format is a file format for executables, object code, and DLLs, used in 32-bit and 64-bit versions of Windows operating systems. • The PE file format was defined to provide the best way for the Windows Operating System to execute code and also to store the essential data which is needed to run a program. Portable Executable File Format is derived from the Microsoft Common Object File Format (COFF). International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057 Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
  • 9. Step by Step Classification : Dataset (PE files): PE is file format for dll, executables, object codes for windows OS. ExtraTreeClassifier: Used for optimizing dataset i.e Splitting/partitioning the legitimate and Non legitimate dataset RandomForestClassifier: Method for classification by constructing multitude of decision tree at training tree International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057 Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
  • 10. Applications: MACHINE LEARNING CAN PLAY A GREAT ROLE IN CYBERSECURITY FIELD .HERE ARE THE SOME APPLICATION OF MACHINE LEARNING IN MALWARE . ML APPLIED IN MALWARE ANALYSIS HELP US TO ANALYSIS/CLASSIFIE THE DIFFERENT TYPE OF MALWARE. ML ALONG WITH NEURAL NETWORK CAN HELP US TO IDENTIFIY AND CLASSIFIE THR MALWARE DURING REAL TIME. SO AS THE PRECAUTION CAN BE TAKEN BEFORE IT IS SPREAD/CAUSE HARM. ML APPLIED IN DETECTING THE MALWARE WILL HELP US TO BUILD BETTER ANTIVIRUSE THAT WILL GIVE BETTER PROTECTION THE IT INFRASTRUCTURE AND ALSO PEOPLE. International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057 Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in
  • 11. THANK-YOU Ramkrushna M. Assistant Professor International Institute of Information Technology, I²IT, P-14, Rajiv Gandhi Infotech Park, Hinjawadi Phase 1, Pune - 411 057 Phone - +91 20 22933441/2/3 | Website - www.isquareit.edu.in | Email - info@isquareit.edu.in http://www.isquareit.edu.in/