Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Science World Journa...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Science World Journal
Article . 2025 . Peer-reviewed
Data sources: Crossref
versions View all 2 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Detection and classification of malware using grid search optimization technique

Authors: Akinshola-Awe, F.J.; Obiniyi, A.A.; Aimufua, Gilbert; Anyachebelu, Kene; Ajayi, Binyamin Adeniyi;

Detection and classification of malware using grid search optimization technique

Abstract

Malware are programs written to compromise the confidentiality, integrity, and availability of information assets, rendering them vulnerable to several destructive attacks, mainly due to the emergence of the Internet. Conventional Antimalware software is not effective at eliminating malware due to its many evasion techniques, such as polymorphism and code obfuscation. Antimalware software is ineffectual and defenceless against zero-day attacks, as it can only eliminate malware for which it has signatures. K Nearest Neighbor, Decision Tree, and Support Vector Machine are some of the leading classifiers that have successfully detected and classified malware, but optimal accuracy of detection has not been achieved. In addition, False Positives and false negatives persist because the hyperparameters of these classifiers were not optimized. Dataset imbalance from an unreliable source is also a major challenge in accurately detecting malware. This research employed K-Nearest Neighbor, Decision Tree, and Support Vector Machine to detect and classify Malware, employing a balanced dataset to train the model. Grid Search optimization technique with cross-validation was used to optimize the hyperparameters of the selected classifiers in order to boost the model's performance and achieve high detection accuracy as well as low false positives and low false negatives. Machine learning performance metrics such as the F1 Score, Precision, Recall, and Accuracy were used to evaluate the performance of the research model. The study achieved high accuracy, outperforming the classical memory analysis model (with tuned hyperparameters), achieving 100% accuracy, false positives of 2, and false negatives of 0 with Support Vector Machine.

Keywords

Malware Detection, Grid Search, Machine Learning, Hyperparameter Optimization

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
gold