This paper is published in Volume-4, Issue-1, 2018
Area
Machine Learning
Author
Yash Shahani, Vedant Yadav, Aditya Subramanian, Karan Chhabria, Vidya Zope
Org/Univ
Vivekanand Education Society's Institute of Management Studies and Research, Mumbai, Maharashtra, India
Pub. Date
23 February, 2018
Paper ID
V4I1-1392
Publisher
Keywords
Malware, Machine Learning, Antivirus, Operational Intelligence Tool.

Citationsacebook

IEEE
Yash Shahani, Vedant Yadav, Aditya Subramanian, Karan Chhabria, Vidya Zope. Anomaly Detection Using Machine Learning, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Yash Shahani, Vedant Yadav, Aditya Subramanian, Karan Chhabria, Vidya Zope (2018). Anomaly Detection Using Machine Learning. International Journal of Advance Research, Ideas and Innovations in Technology, 4(1) www.IJARIIT.com.

MLA
Yash Shahani, Vedant Yadav, Aditya Subramanian, Karan Chhabria, Vidya Zope. "Anomaly Detection Using Machine Learning." International Journal of Advance Research, Ideas and Innovations in Technology 4.1 (2018). www.IJARIIT.com.

Abstract

In this day and age of a plethora of information, the importance of information security cannot be emphasized enough. Any threat to confidentiality, integrity or availability of information must be taken seriously. Ignoring such threats can have serious consequences, like misappropriation, modification or encryption of data. Vulnerabilities in information security are a tempting target for malware. Malware are malicious scripts or software, including computer viruses, worms, Trojan-horses, ransomware, spyware, adware, etc. The traditional way of detecting an advanced malware or threat compromise uses a signature-based antivirus. This approach, however, is not foolproof and can be bypassed. The signature-based approach relies on a known list of signatures. The list of signatures is not perfect and also does not contain previously unseen malware signatures. The proposed system uses operational intelligence tools and machine learning to monitor usual user behavior. This is done by collecting system activities like event logs, sysinternal, etc. Once the system learns normal behavior patterns, it can detect anomalies that may be caused by malware. Thus, unlike signature-based approach, the proposed system can detect previously unseen malware as well.