Show simple item record

dc.contributor.advisorKaykobad, Mohammad
dc.contributor.authorRahman, Mohammad Muhibur
dc.contributor.authorAhmed, Anushua
dc.contributor.authorKhan, Mutasim Husain
dc.contributor.authorJamshed, Abrar
dc.contributor.authorRahman, Md Hafijur
dc.date.accessioned2024-06-25T04:05:16Z
dc.date.available2024-06-25T04:05:16Z
dc.date.copyright©2023
dc.date.issued2023-09
dc.identifier.otherID 19201079
dc.identifier.otherID 19201082
dc.identifier.otherID 19201002
dc.identifier.otherID 19301058
dc.identifier.otherID 19201067
dc.identifier.urihttp://hdl.handle.net/10361/23557
dc.descriptionThis thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2023.en_US
dc.descriptionCataloged from PDF version of thesis.
dc.descriptionIncludes bibliographical references (pages 46-50).
dc.description.abstractMalware represents an intrusive computer program that is engineered by cybercriminals to destroy computer systems or steal and manipulate sensitive data. Malware classification is crucial to malware detection as it helps to assign malware to a specific category according to its characteristics. Characterizing and labeling variants of spyware is also useful as it will shed light on how they’re able to gain access to our systems in the first place, the dangers they possess, and the necessary preventions to take against them. In order to tackle such a serious security-related issue, we have decided to develop an image-processing system that would help us be faster at detecting malware while also possibly being one step ahead of cybercriminals. To describe and categorize sourced malware datasets, we will develop the system using various approaches for deep learning methods and even propose a simple CNN-based methodology of our own. The aim of our work is to show a comparative study of malware types with experimental results, making it easier to identify and keep track of malware that already exists while helping to detect new ones. To be more specific, we worked with four pre-trained CNN models in order to diversify our methods. These trained models include ResNet-50, Inception-V3, VGG-16, and DenseNet-201. After running and testing all of the models on the Malimg dataset, our suggested model was able to achieve a 97.64% accuracy rate in detecting malware greyscale images. This high level of testing accuracy also slightly outperformed some of the other cutting-edge models used in our comparison study on the dataset. These modern and highly developed models used for comparison include Involution, Vision Transformer (ViT), Compact Convolutional Transformer (CCT), and External Attention Network (EANet). Finally, we employed the use of an explainable artificial intelligence (AI) technique known as LIME to provide a more detailed clarification of the rationale behind our model’s selection and classification of individual samples into their respective classes.en_US
dc.description.statementofresponsibilityMohammad Muhibur Rahman
dc.description.statementofresponsibilityAnushua Ahmed
dc.description.statementofresponsibilityMutasim Husain Khan
dc.description.statementofresponsibilityAbrar Jamshed
dc.description.statementofresponsibilityMd Hafijur Rahman
dc.language.isoenen_US
dc.rightsBrac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectMalwareen_US
dc.subjectDeep learningen_US
dc.subjectNeural networken_US
dc.subjectTransformeren_US
dc.subject.lcshData mining
dc.subject.lcshMalware (Computer software)--Prevention
dc.subject.lcshElectronic transformers--Design and construction
dc.titleA study of malware classification using deep learningen_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, Brac University
dc.description.degreeB.Sc in Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record