dc.contributor.author | Siddiquie, Huma | |
dc.contributor.author | Supervised by Dr Muhammad Faisal Amjad. | |
dc.date.accessioned | 2020-10-27T07:44:08Z | |
dc.date.available | 2020-10-27T07:44:08Z | |
dc.date.issued | 2018-08 | |
dc.identifier.other | TIS-294 | |
dc.identifier.other | MSIS-14 | |
dc.identifier.uri | http://10.250.8.41:8080/xmlui/handle/123456789/5817 | |
dc.description.abstract | According to SANS Common weakness Enumeration Heap Overflow vulnerability is among twenty five most dangerous software errors which if exploited in an organized manner aids the attacker to gain privilege escalation. Detection of malwares that can exploit this vulnerability requires the combination of datamining and machine learning techniques. Our work presents a hybrid malware detection technique that is the combination of both data mining and machine learning approach. For overcoming the absence of typical anti-virus software we have used static analysis technique to extract features of malwares. We extracted features from malware binaries then calling frequencies of the raw features are collected to select valuable features. Feature engineering technique is used for the reduction of the selected features. The created feature set is used to train three classifiers J48, K-Star and Simple logistic for the detection of malwares that exploit heap based overflow vulnerability. By embracing the notion of machine learning and datamining a static malware detection technique is proposed. The proposed technique is easy to implement in operations of cyber security to comprehend the behavior of malwares targeting their organizations. | en_US |
dc.language.iso | en | en_US |
dc.publisher | MCS | en_US |
dc.title | Detection of Heap-Based Overflow in binary Codes | en_US |
dc.type | Thesis | en_US |