Search Results for author: Sanjay K. Sahay

Found 20 papers, 0 papers with code

Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review

no code implementations6 Jun 2022 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

Different techniques and algorithms under deep reinforcement learning have shown great promise in applications ranging from games to industrial processes, where it is claimed to augment systems with general AI capabilities.

reinforcement-learning Reinforcement Learning (RL)

ADVERSARIALuscator: An Adversarial-DRL Based Obfuscator and Metamorphic Malware SwarmGenerator

no code implementations23 Sep 2021 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

The so generated data and simulations could be used to bolster the defenses of an IDS against an actual AI-based metamorphic attack from advanced malware and ransomware.

DRo: A data-scarce mechanism to revolutionize the performance of Deep Learning based Security Systems

no code implementations12 Sep 2021 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

We also developed a system named DRoID that uses the DRo mechanism for enhancing the performance of an existing Malware Detection System that uses (low information features like the) Android implicit Intent(s) as the only features.

Deep Clustering Malware Detection

Identification of Significant Permissions for Efficient Android Malware Detection

no code implementations28 Feb 2021 Hemant Rathore, Sanjay K. Sahay, Ritvik Rajvanshi, Mohit Sewak

In this paper, we performed a comprehensive feature analysis to identify the significant Android permissions and propose an efficient Android malware detection system using machine learning and deep neural network.

Android Malware Detection BIG-bench Machine Learning +1

DRLDO: A novel DRL based De-ObfuscationSystem for Defense against Metamorphic Malware

no code implementations1 Feb 2021 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

With the inclusion of the DRLDO as a sub-component, an existing Intrusion Detection System could be augmented with defensive capabilities against 'zero-day' attacks from obfuscated and metamorphic variants of existing malware.

Intrusion Detection

Robust Android Malware Detection System against Adversarial Attacks using Q-Learning

no code implementations27 Jan 2021 Hemant Rathore, Sanjay K. Sahay, Piyush Nikam, Mohit Sewak

Finally, we propose an adversarial defense strategy that reduces the average fooling rate by threefold to 15. 22% against a single policy attack, thereby increasing the robustness of the detection models i. e. the proposed model can effectively detect variants (metamorphic) of malware.

Adversarial Defense Android Malware Detection +5

Assessment of the Relative Importance of different hyper-parameters of LSTM for an IDS

no code implementations26 Dec 2020 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

In the process, we also determine the relative importance of all the different hyper-parameters of an LSTM network as applied to malware detection using their op-code sequence representations.

Intrusion Detection Language Modelling +1

DeepIntent: ImplicitIntent based Android IDS with E2E Deep Learning architecture

no code implementations16 Oct 2020 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

So far neither the feasibility of developing an Intrusion Detection System solely on implicit Intent has been explored, nor are any benchmarks available of a malware classifier that is based on implicit Intent alone.

Intrusion Detection

DOOM: A Novel Adversarial-DRL-Based Op-Code Level Metamorphic Malware Obfuscator for the Enhancement of IDS

no code implementations16 Oct 2020 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

We designed and developed DOOM (Adversarial-DRL based Opcode level Obfuscator to generate Metamorphic malware), a novel system that uses adversarial deep reinforcement learning to obfuscate malware at the op-code level for the enhancement of IDS.

reinforcement-learning Reinforcement Learning (RL)

A Novel Spatial-Spectral Framework for the Classification of Hyperspectral Satellite Imagery

no code implementations22 Jul 2020 Shriya TP Gupta, Sanjay K. Sahay

Therefore, in this paper, we present a novel framework that takes into account both the spectral and spatial information contained in the data for land cover classification.

Classification General Classification +1

An Efficient Detection of Malware by Naive Bayes Classifier Using GPGPU

no code implementations30 May 2019 Sanjay K. Sahay, Mayank Chaudhari

Due to continuous increase in the number of malware (according to AV-Test institute total ~8 x 10^8 malware are already known, and every day they register ~2. 5 x 10^4 malware) and files in the computational devices, it is very important to design a system which not only effectively but can also efficiently detect the new or previously unseen malware to prevent/minimize the damages.

General Classification

Malware Detection using Machine Learning and Deep Learning

no code implementations4 Apr 2019 Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak

Current state-of-the-art research shows that recently, researchers and anti-virus organizations started applying machine learning and deep learning methods for malware analysis and detection.

BIG-bench Machine Learning Malware Analysis +1

Group-wise classification approach to improve Android malicious apps detection accuracy

no code implementations3 Apr 2019 Ashu Sharma, Sanjay K. Sahay

Therefore, any security gap in these devices means that the information stored or accessing the smart devices are at high risk of being breached by the malware.

General Classification

Detection of Advanced Malware by Machine Learning Techniques

no code implementations7 Mar 2019 Sanjay Sharma, C. Rama Krishna, Sanjay K. Sahay

In today's digital world most of the anti-malware tools are signature based which is ineffective to detect advanced unknown malware viz.

BIG-bench Machine Learning feature selection +2

Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection

no code implementations16 Sep 2018 Mohit Sewak, Sanjay K. Sahay, Hemant Rathore

Recently, Deep Learning has been showing promising results in various Artificial Intelligence applications like image recognition, natural language processing, language modeling, neural machine translation, etc.

BIG-bench Machine Learning General Classification +4

Hybrid Approach for Inductive Semi Supervised Learning using Label Propagation and Support Vector Machine

no code implementations2 Dec 2015 Aruna Govada, Pravin Joshi, Sahil Mittal, Sanjay K. Sahay

Semi supervised learning methods have gained importance in today's world because of large expenses and time involved in labeling the unlabeled data by human experts.

Cannot find the paper you are looking for? You can Submit a new open access paper.