Antivirus applied to JAR malware detection based on runtime behaviors

8Citations
Citations of this article
1.1kReaders
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Java vulnerabilities correspond to 91% of all exploits observed on the worldwide web. The present work aims to create antivirus software with machine learning and artificial intelligence and master in Java malware detection. Within the proposed methodology, the suspected JAR sample is executed to intentionally infect the Windows OS monitored in a controlled environment. In all, our antivirus monitors and considers, statistically, 6824 actions that the suspected JAR file can perform when executed. Our antivirus achieved an average performance of 91.58% in the distinction between benign and malware JAR files. Different initial conditions, learning functions and architectures of our antivirus are investigated. The limitations of commercial antiviruses can be supplied by intelligent antiviruses. Instead of blacklist-based models, our antivirus allows JAR malware detection preventively and not reactively as Oracle’s Java and traditional antivirus modus operandi.

Cite

CITATION STYLE

APA

Pinheiro, R. P., Lima, S. M. L., Souza, D. M., Silva, S. H. M. T., Lopes, P. G., de Lima, R. D. T., … Santos, W. P. dos. (2022). Antivirus applied to JAR malware detection based on runtime behaviors. Scientific Reports, 12(1). https://doi.org/10.1038/s41598-022-05921-5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free