International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 112

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


N-Gram Analysis in SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection

Pagidimarri Venu, Dasu Vaman Ravi Prasad


Abstract: An n-gram is a sub-sequence of n items from a given sequence. Various areas of statistical natural language processing and genetic sequence analysis are using N-gram Analysis. In which sequence analysis is the process of comparing the sequence or series of attributes in order to find the similarity. Malicious software that is designed by attackers for disturbing computers is called as malware. The principal belong to the same family of malware eventhough Malware variants will have distinct byte level representations. The byte level content is different because small changes to the malware source code can result in significantly different compiled object code. In which programs are used as operational code (opcode) density histograms obtained through dynamic analysis. The process of testing and evaluation of application or a program during running time is called as dynamic analysis. A SVM is used for classification or regression problems. Kernel trickis a technique by SVM to transform your data and then based on these transformations it finds an optimal boundary between the possible outputs. We employ static analysis to classify malware which is identified a prefilter stage using hex values of files, that can reduce the feature set and therefore reduce the training effort. The result shows that the relationships between features are complex and simple statistics filtering approaches do not provide a Practical approach. One of the approach, hex decimal based produces a suitable filter. The entire system will be implemented in WEKA tool.


Keywords: n-gram analysis, malware variants, kernel trick, SVM, WEKA tool


Edition: Volume 3 Issue 9, September 2014,


Pages: 550 - 554


How to Cite this Article?

Pagidimarri Venu, Dasu Vaman Ravi Prasad, "N-Gram Analysis in SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SEP14107, Volume 3 Issue 9, September 2014, 550 - 554

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'SVM'

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1188 - 1193

Profit Contribution of Bank Customer from Different Business Liabilities

Vinod Desai, Shalini B Ullagaddi, Vittal A Odeyar

Share this Article

Downloads: 6

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 314 - 318

Parkinson Disease Detection Using Machine Learning Algorithms

Yatharth Nakul, Ankit Gupta, Hritik Sachdeva

Share this Article

Similar Articles with Keyword 'WEKA tool'

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2790 - 2794

Risk Distribution and Validation of Data in Passport Data Analysis Using Cluster Analysis

Sucheta Gulia, Dr. Rajan Vohra

Share this Article

Downloads: 107

Comparative Studies, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 761 - 765

Comparative Study of Soft Computing Techniques on Medical Datasets

Mangesh Metkari, M.A. Pradhan

Share this Article

Similar Articles with Keyword 'analysis'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 115 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Similar Articles with Keyword 'malware'

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 863 - 865

Detection of Malicious URLs using Classification Algorithm

Muskan V. Jaiswal, Dr. Anjali B. Raut

Share this Article

Downloads: 5

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 866 - 868

Detecting and Blocking of Malicious URL

Muskan V. Jaiswal, Anjali B. Raut

Share this Article

Similar Articles with Keyword 'variants'

Downloads: 102

Survey Paper, Computer Science & Engineering, Nigeria, Volume 3 Issue 10, October 2014

Pages: 1774 - 1778

An Analytical Survey of Real Time System Scheduling Techniques

Ayeni, J. A., Odion A. E., Ogbormor-Odikayor I.F

Share this Article

Downloads: 108

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2851 - 2857

Rotation and Scale Invariant Automated Logo Recognition System using Moment Invariants and Hough Transform

Souvik Ghosh, Ranjan Parekh

Share this Article

Similar Articles with Keyword 'kernel'

Downloads: 61

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 28 - 37

Glaucoma Detection Using Machine Learning

Sharanya S

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Similar Articles with Keyword 'trick'

Downloads: 109

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1488 - 1491

A Survey on: Email Security for Targeted Malicious Attacks

Jagdish R. Yadav, Dr. A. K. Srivastava

Share this Article

Downloads: 117

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 188 - 193

Performance Enhancement of Dimension Reduction for Microarray Data

Shubhangi N. Katole, Swapnili P. Karmore

Share this Article
Top