0% found this document useful (0 votes)
8 views12 pages

Malware Detection System

The document presents a malware detection system utilizing machine learning, highlighting its advantages over existing systems, such as enhanced detection accuracy and real-time protection. It outlines the hardware and software requirements necessary for implementation, as well as the disadvantages of current methods. The conclusion emphasizes the harmful nature of malware and the importance of effective detection and remediation strategies.

Uploaded by

Arukula Chandana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views12 pages

Malware Detection System

The document presents a malware detection system utilizing machine learning, highlighting its advantages over existing systems, such as enhanced detection accuracy and real-time protection. It outlines the hardware and software requirements necessary for implementation, as well as the disadvantages of current methods. The conclusion emphasizes the harmful nature of malware and the importance of effective detection and remediation strategies.

Uploaded by

Arukula Chandana
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

MALWARE DETECTION

SYSTEM USING MACHINE


LEARNING

 Presented by
 A.chandana(21C31A5604)
 N.Kavya(21C31A5636)
 M.Bhanu Prakash(21C31A5628)
 V.Harshavardhan chary(21C31A5657)
CONTENTS
 Introduction
 Hardware Requirements
 Software Requirements
 Disadvantages of Existing System
 Advantages of Proposed system
 Functional Diagram
 Execution(output)
 Conclusion
INTRODUCTION

Malicious software, refers


to any intrusive
software developed by
cybercriminals to steal
data and damage or
destroy computers and
computer system
HARDWARE REQUIREMENTS

 PROCESSOR: Intel Pentium core or above


 RAM:6 GB
 HARD DISK: 64 GB
SOFTWARE
REQUIREMENTS
 Windows 7 Above
 Ubuntu V12.04 and Above
 Frontend : HTML,CSS,Python
 Data : exe files
 Machine learning Requirements :-

Pandas,numpy,keras,seaborne.
Disadvantages of Existing
System
 Reliance on a pre-trained model that may
not be updated regularly
 Limited feature extraction capabilities
 No real-time threat intelligence updates
 No automated incident response

or remediation.
Advantages of proposed
system

 Enhancing detection accuracy and


reducing false positives.
 Providing real-time protection against

zero-day attacks
 Automating malware analysis and

remediation
 Improving scalability and efficiency
Modules
 Scikit- learn
 Numpy
 Pickle
 Pefile
 Math
 Tempfile
 Flask
 IO
 OS
FUNCTIONAL
DIAGRAM
EXECUTION (Output)
CONCLUSION
Malware is any type of
software that causes
damage to a system or
allow access to
unauthorized data from
virus that replicate
themselves throughout a
system

You might also like