dc.contributor.advisor | Mostakim, Moin | |
dc.contributor.advisor | Hossain, Muhammad Iqbal | |
dc.contributor.author | Kayum, Syed Irfan | |
dc.contributor.author | Hossain, Humaira | |
dc.contributor.author | Tasnim, Nafisa | |
dc.contributor.author | Paul, Arja | |
dc.contributor.author | Rohan, Alim Aldin | |
dc.date.accessioned | 2021-10-07T09:14:14Z | |
dc.date.available | 2021-10-07T09:14:14Z | |
dc.date.copyright | 2021 | |
dc.date.issued | 2021-01 | |
dc.identifier.other | ID 17101272 | |
dc.identifier.other | ID 17101395 | |
dc.identifier.other | ID 17101143 | |
dc.identifier.other | ID 17301006 | |
dc.identifier.other | ID 17101202 | |
dc.identifier.uri | http://hdl.handle.net/10361/15176 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2021. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (page 37-40). | |
dc.description.abstract | One of the great and major issues facing the Internet today is a large amount of data and files that need to be analyzed for possible malicious purposes. Malicious software also referred to as an attacker’s malware is polymorphic and metamorphic in design. It has the potential to modify their code as it spreads. Increased malware and sophisticated cyber attacks are becoming a serious issue. Unknown malware that has not been identified by security vendors is often used in these attacks, making it difficult to protect terminals from infection. As of now, there is a lot of research being performed to identify and monitor malware. After acknowledgment of the deep learning area, several researchers have tried to detect malware using neural networks and deep learning methods. This paper contrasts the performance of three different neural networking models: Convolutional Neural Networks (CNN), Long-Short Term Memory (LSTM) Network, and Gated Recurrent Unit (GRU) for malware detection. Besides, we used secondary data to gather information about malware activity. | en_US |
dc.description.statementofresponsibility | Syed Irfan Kayum | |
dc.description.statementofresponsibility | Humaira Hossain | |
dc.description.statementofresponsibility | Nafisa Tasnim | |
dc.description.statementofresponsibility | Arja Paul | |
dc.description.statementofresponsibility | Alim Aldin Rohan | |
dc.format.extent | 40 Pages | |
dc.language.iso | en | en_US |
dc.publisher | Brac University | en_US |
dc.rights | Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | Convolutional Neural Network | en_US |
dc.subject | Long-Short Term Memory Network | en_US |
dc.subject | Gated Recurrent Unit | en_US |
dc.subject | secondary data | en_US |
dc.subject | Malware | en_US |
dc.subject | Threats | en_US |
dc.subject.lcsh | Neural networks (Computer science) | |
dc.title | Malware Detection Using Neural Network | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, Brac University | |
dc.description.degree | B. Computer Science | |