메뉴 건너뛰기
.. 내서재 .. 알림
소속 기관/학교 인증
인증하면 논문, 학술자료 등을  무료로 열람할 수 있어요.
한국대학교, 누리자동차, 시립도서관 등 나의 기관을 확인해보세요
(국내 대학 90% 이상 구독 중)
로그인 회원가입 고객센터 ENG
주제분류

추천
검색
질문

논문 기본 정보

자료유형
학술저널
저자정보
Marvy Badr Monir Mansour (The British University in Egypt) Asmaa Abdelghaffar Youssef Gadalla (The British University in Egypt)
저널정보
한국지능시스템학회 INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT SYSTEMS INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT SYSTEMS Vol.25 No.1
발행연도
2025.3
수록면
11 - 36 (26page)
DOI
10.5391/IJFIS.2025.25.1.11

이용수

표지
📌
연구주제
📖
연구배경
🔬
연구방법
🏆
연구결과
AI에게 요청하기
추천
검색
질문

초록· 키워드

오류제보하기
Owing to progress in the usage of Internet-based applications, cybersecurity has become more important in various fields, such as education, government, and finance, as the risk of cyberattacks against networks has evolved. In this paper, we present a novel approach to developing an effective system that both detects malware and classifies URLs. We developed machine learning-driven malware detection techniques for the proposed system using portable executable (PE) header data. In our system, we employ decision trees and random forest models for malware detection, in which the chosen features are trained and tested to achieve high accuracy. The classifier that yields the highest classification accuracy is retained for use when new information needs to be classified. We applied strategies such as feature engineering, hyperparameter tuning, and the use of a confusion matrix heatmap for model optimization and enhancement. In addition, we adopted random forest, support vector machine, and logistic regression classifiers in our system. Our main objective was to obtain broad and accurate classifications of URLs. Using the accuracy, precision, recall, and f1-score, we evaluated the performance of our proposed system. Among the tested models, the random forest model yielded the highest accuracy of 99.98% for malware detection and 90.59% for malicious URL detection. The simulation results and comparison with other state-of-the-art approaches demonstrate that our system is robust in detecting cyberattacks and achieving cybersecurity.

목차

Abstract
1. Introduction
2. Background
3. Preliminaries
4. Methodology
5. Simulation and Results
6. Comparison and Discussion
7. Conclusion and Future Work
References

참고문헌 (0)

참고문헌 신청

함께 읽어보면 좋을 논문

논문 유사도에 따라 DBpia 가 추천하는 논문입니다. 함께 보면 좋을 연관 논문을 확인해보세요!

이 논문과 함께 이용한 논문

최근 본 자료

전체보기

댓글(0)

0

UCI(KEPA) : I410-151-25-02-092466253