Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Trojan Detection System Using Machine Learning Approach

View through CrossRef
Malware attack cases continue to rise in our current day. The Trojan attack, which may be extremely destructive by unlawfully controlling other users' computers in order to steal their data. As a result, Trojan horse detection is essential to identify the Trojan and limit Trojan attacks. In this study, we proposed a Trojan detection system that employed machine learning algorithms to detect Trojan horses within the system. A public dataset of Trojan horses that contain 2001 samples comprises of 1041 Trojan horses and 960 of benign is used to train the machine learning classification. In this paper, the Trojan detection system is trained using four types of classifiers which are Random Forest, J48, Decision Table and Naïve Bayes. WEKA is used for the execution of the classification process and performance analysis. The results indicated that the detection system trained with the Random Forest and Decision Table algorithms obtained the maximum level of accuracy.
Title: Trojan Detection System Using Machine Learning Approach
Description:
Malware attack cases continue to rise in our current day.
The Trojan attack, which may be extremely destructive by unlawfully controlling other users' computers in order to steal their data.
As a result, Trojan horse detection is essential to identify the Trojan and limit Trojan attacks.
In this study, we proposed a Trojan detection system that employed machine learning algorithms to detect Trojan horses within the system.
A public dataset of Trojan horses that contain 2001 samples comprises of 1041 Trojan horses and 960 of benign is used to train the machine learning classification.
In this paper, the Trojan detection system is trained using four types of classifiers which are Random Forest, J48, Decision Table and Naïve Bayes.
WEKA is used for the execution of the classification process and performance analysis.
The results indicated that the detection system trained with the Random Forest and Decision Table algorithms obtained the maximum level of accuracy.

Related Results

Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
Selection of Injectable Drug Product Composition using Machine Learning Models (Preprint)
BACKGROUND As of July 2020, a Web of Science search of “machine learning (ML)” nested within the search of “pharmacokinetics or pharmacodynamics” yielded over 100...
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
CREATING LEARNING MEDIA IN TEACHING ENGLISH AT SMP MUHAMMADIYAH 2 PAGELARAN ACADEMIC YEAR 2020/2021
The pandemic Covid-19 currently demands teachers to be able to use technology in teaching and learning process. But in reality there are still many teachers who have not been able ...
The Trojan War in the Middle Ages
The Trojan War in the Middle Ages
In the Middle Ages, the Fall of Troy functioned as the secular parallel to the Fall of Man. Just as sacred history begins with the Creation, the Fall, and then Adam and Eve being f...
The NASA Lucy Mission: Surveying the Diversity of Trojan Asteroids
The NASA Lucy Mission: Surveying the Diversity of Trojan Asteroids
The Lucy Mission is a NASA Discovery class mission to send a highly capable and robust spacecraft to investigate seven Jupiter Trojan asteroids; a class of stable, primitive bodies...
Analisa Metasploit Framework “msfvenom” Backdoor Trojan dan Fully Undetected (FUD) Trojan
Analisa Metasploit Framework “msfvenom” Backdoor Trojan dan Fully Undetected (FUD) Trojan
Pengunaan teknologi informasi berupa penggunaan internet di Indonesia terus mengalami peningkatan sejak 2 dekade terakhir hingga 73,24% atau 202 juta jiwa dari 275.77 juta jiwa pen...
A comprehensive review of machine learning's role in enhancing network security and threat detection
A comprehensive review of machine learning's role in enhancing network security and threat detection
As network security threats continue to evolve in complexity and sophistication, there is a growing need for advanced solutions to enhance network security and threat detection cap...
Machine Learning for Enhancing Mortgage Origination Processes: Streamlining and Improving Efficiency
Machine Learning for Enhancing Mortgage Origination Processes: Streamlining and Improving Efficiency
The mortgage industry, historically characterized by manual processes, paperwork, and complex decision-making, is on the brink of a digital revolution driven by machine learning (M...
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
The rapid expansion of the fintech sector has brought with it an increasing demand for robust and sophisticated fraud detection systems capable of managing large volumes of financi...

Back to Top