Machine Learning based Malware Classification Framework using Malware Behavior / (Record no. 616601)

000 -LEADER
fixed length control field 02692nam a22001817a 4500
003 - CONTROL NUMBER IDENTIFIER
control field NUST
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20260311125241.0
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8,JAV
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Javed, Sheikh Muhammad Zeeshan
9 (RLIN) 133638
245 ## - TITLE STATEMENT
Title Machine Learning based Malware Classification Framework using Malware Behavior /
Statement of responsibility, etc. Sheikh Muhammad Zeeshan Javed
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Rawalpindi,
Name of publisher, distributor, etc. MCS (NUST),
Date of publication, distribution, etc. 2026
300 ## - PHYSICAL DESCRIPTION
Extent xvii, 132 p
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Malware analysis is a critical component of modern cybersecurity, enabling the identification,<br/>understanding, and mitigation of malicious software. This dissertation investigates<br/>the evolution of machine learning–based approaches for large-scale, behavior-driven<br/>malware classification, with the objective of improving detection accuracy, scalability,<br/>and robustness across diverse computing platforms.<br/>Initially, this research presents a comprehensive review of existing machine learning–<br/>based malware detection and classification techniques, highlighting their strengths<br/>and limitations. Static analysis–based approaches, which extract features directly from<br/>executable files without program execution, have gained widespread adoption due to<br/>their low computational cost and ease of deployment. However, these methods are highly<br/>susceptible to obfuscation, packing, and evasion techniques. Dynamic analysis–based approaches,<br/>which examine malware behavior during execution in controlled environments,<br/>have been increasingly explored. Although dynamic analysis offers improved resilience<br/>against static evasion techniques, many existing approaches rely on a limited set of<br/>behavioral features, such as API call sequences. This narrow feature representation<br/>limits their ability to capture complex and evolving malware behaviors, thereby reducing<br/>classification performance and generalization in real-world, large-scale environments.<br/>Subsequently, this dissertation proposes a novel malware classification framework<br/>based on a stack ensemble machine learning model that leverages large-scale IoT malware<br/>behavioral data. The proposed framework integrates multi-dimensional dynamic<br/>features, including memory dump characteristics, file system activities, network interactions,<br/>process behaviors, command executions, URL communications, and memory access patterns. A key contribution of this work is its scalability and computational<br/>efficiency, which make it well-suited for deployment in resource-constrained IoT environments<br/>while achieving high classification accuracy.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element PhD Information Security Thesis
9 (RLIN) 132793
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name PhD IS Thesis
9 (RLIN) 132794
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Supervised by Dr. Muhammad Faisal Amjad
9 (RLIN) 133639
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Thesis
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
          Military College of Signals (MCS) Military College of Signals (MCS) Thesis 03/11/2026   005.8,JAV MCSPhD IS-19 03/11/2026 03/11/2026 Thesis
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.