<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Journal of Physical Chemistry and Functional Materials</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2651-3080</issn>
                                        <issn pub-type="epub">2651-3080</issn>
                                                                                            <publisher>
                    <publisher-name>Niyazi BULUT</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.54565/jphcfum.1579687</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Bioinformatics and Computational Biology (Other)</subject>
                                                            <subject>Functional Materials</subject>
                                                            <subject>Materials Engineering (Other)</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Biyoinformatik ve Hesaplamalı Biyoloji (Diğer)</subject>
                                                            <subject>Fonksiyonel Malzemeler</subject>
                                                            <subject>Malzeme Mühendisliği (Diğer)</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>A Hybrid Method Based On A Genetic Algorithm That Uses Network Packets To Classify Spyware</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-5079-2825</contrib-id>
                                                                <name>
                                    <surname>Kılıç</surname>
                                    <given-names>İrfan</given-names>
                                </name>
                                                                    <aff>FIRAT ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0001-9623-2284</contrib-id>
                                                                <name>
                                    <surname>Yaman</surname>
                                    <given-names>Orhan</given-names>
                                </name>
                                                                    <aff>FIRAT UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0005-0383-403X</contrib-id>
                                                                <name>
                                    <surname>Erdoğan</surname>
                                    <given-names>Edanur</given-names>
                                </name>
                                                                    <aff>FIRAT UNIVERSITY</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0009-0005-2734-8159</contrib-id>
                                                                <name>
                                    <surname>Aslan</surname>
                                    <given-names>Melisa İrem</given-names>
                                </name>
                                                                    <aff>FIRAT UNIVERSITY</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20241218">
                    <day>12</day>
                    <month>18</month>
                    <year>2024</year>
                </pub-date>
                                        <volume>7</volume>
                                        <issue>2</issue>
                                        <fpage>148</fpage>
                                        <lpage>157</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20241105">
                        <day>11</day>
                        <month>05</month>
                        <year>2024</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20241110">
                        <day>11</day>
                        <month>10</month>
                        <year>2024</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2018, Journal of Physical Chemistry and Functional Materials</copyright-statement>
                    <copyright-year>2018</copyright-year>
                    <copyright-holder>Journal of Physical Chemistry and Functional Materials</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>The emergence of the Internet has led to the emergence of cyber-attacks and malware. Malware installed on mobile devices, including computers, phones, and tablets, can be used by attackers to access users&#039; data. This study aims to use decision trees (DT) and genetic algorithms (GA) using a meta-heuristic approach to detect spyware, a category of malware, by analyzing network packets in a Windows operating system environment. When the literature is examined, it is noteworthy that there is a lack of studies on the detection of spyware using network packets. This situation was the driving force for this study. In order to carry out the study, an experimental environment was created by utilizing the laboratory facilities of Firat University, Faculty of Technology, Department of Forensic Informatics Engineering. In this experimental environment, various network packets were collected using different spyware applications. The data set was subjected to feature extraction using Tshark software. The effectiveness of meta-heuristics compared to the mathematical method of neighborhood component analysis (NCA) is demonstrated on the benchmark dataset. Therefore, a genetic algorithm (GA) was used to select the most weighted features among the extracted features. The selected features were classified with the decision tree (DT) algorithm. The results obtained are at the desired level for future studies.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>Spyware classification</kwd>
                                                    <kwd>  Genetic algorithm</kwd>
                                                    <kwd>  Decision trees</kwd>
                                                    <kwd>  Neighborhood components analysis</kwd>
                                                    <kwd>  Network packets</kwd>
                                            </kwd-group>
                            
                                                                                                                                                <funding-group specific-use="FundRef">
                    <award-group>
                                                                            <award-id>1919B012219445</award-id>
                                            </award-group>
                </funding-group>
                                </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">G. Canbek and Ş. Sağıroğlu, “Kötücül ve Casus Yazılımlar: Kapsamlı bir Araştırma,” J. Fac. Eng. Archit. Gazi Univ., vol. 22, no. 1, pp. 121–136, 2007.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">K. Pandey, M. Naik, J. Qamar, and M. Patil, “Spyware Detection Using Data Mining,” Int. J. Eng. Tech., vol. 1, no. 2, pp. 5–8, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">S. Yadav and P. R. Randale, “Detection and Prevention of Keylogger Spyware Attack,” Int. J. Adv. Found. Res. Sci. Eng., vol. 1, pp. 1–5, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">İ. Bulut, “Analiz Sürecini Atlatmaya Çalışan Zararlı YAzılımlar ve Derin Öğrenme Temelli Zararlı Yazılım Tespiti,” Yıldız Teknik Üniversitesi, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">C. A. Dinçer and İ. A. Doğru, “Android Kötücül Yazılım Tespiti Yaklaşımları,” Uluslararası Bilgi Güvenliği Mühendisliği Derg., no. 2, pp. 48–58, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">A. Utku, “Using network traffic analysis deep learning based Android malware detection,” J. Fac. Eng. Archit. Gazi Univ., vol. 37, no. 4, pp. 1823–1838, 2022, doi: 10.17341/gazimmfd.937374</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">A. Mehtab et al., “AdDroid: Rule-Based Machine Learning Framework for Android Malware Analysis,” Mob. Networks Appl., vol. 25, no. 1, pp. 180–192, 2020, doi: 10.1007/s11036-019-01248-0</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">A. Pektaş and T. Acarman, “Deep learning for effective Android malware detection using API call graph embeddings,” Soft Comput., vol. 24, no. 2, pp. 1027–1043, 2020, doi: 10.1007/s00500-019-03940-5</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">K. Bakour and H. M. Ünver, “DeepVisDroid: android malware detection by hybridizing image-based features with deep learning techniques,” Neural Comput. Appl., vol. 33, no. 18, pp. 11499–11516, 2021, doi: 10.1007/s00521-021-05816-y</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">M. Tokmak and E. U. Küçüksille, “Detection of Windows Executable Malware Files with Deep Learning,” Bilge Int. J. Sci. Technol. Res., vol. 3, pp. 67–76, 2019, doi: 10.30516/bilgesci.531801</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">C. K. Bauri, C. Indulkar, S. Jadhav, and P. A. S. Khandagale, “A Survey on Windows Post Exploitation [MSF] Keylogger for Security,” Int. J. Res. Appl. Sci. Eng. Technol., vol. 10, no. 3, pp. 721–726, 2022, doi: 10.22214/ijraset.2022.40684</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">D. Javaheri, M. Hosseinzadeh, and A. M. Rahmani, “Detection and elimination of spyware and ransomware by intercepting kernel-level system routines,” IEEE Access, vol. 6, pp. 78321–78332, 2018, doi: 10.1109/ACCESS.2018.2884964</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">M. NarasimaMallikarajunan.K., Preethi.S.R, Selvalakshmi.S, and Nithish.N, “Detection of Spyware in Software Using Virtual Environment,” in Proceedings of the Third International Conference on Trends in Electronics and Informatics (ICOEI 2019), 2019, pp. 1138–1142.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">M. Dama, “Windows Fonksiyonları Kullanılarak Özgün Bir Casus Yazılım Tasarımı ve Alınabilecek Önlemler,” Gazi Üniversitesi, 2014.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">E. Erginay, “Ağ trafiğinde anormallik tespiti için veri seti oluşturma ve test yöntemlerinin karşılaştırılması,” Gazi Üniversitesi, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">P. McLaren, G. Russell, and B. Buchanan, “Mining malware command and control traces,” Proc. Comput. Conf. 2017, vol. 2018-Janua, no. July, pp. 788–794, 2018, doi: 10.1109/SAI.2017.8252185</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">W. Ames, “Understanding Spyware : Risk and Response,” Security, no. October, pp. 1–12, 2005.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">“Spyera,” 2023. Available: https://spyera.com/tr/. [Accessed: Nov. 01, 2023]</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">“Browser Hijacker.” Available: https://www.malwarebytes.com/blog/threats/browser-hijacker. [Accessed: Nov. 01, 2023]</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">S. Wang, “Analysis and Application of Wireshark in TCP/IP Protocol Teaching,” 2010 Int. Conf. E-Health Netw. Digit. Ecosyst. Technol., vol. 2, pp. 269–272, 2010.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">U. Lamping, R. Sharpe, and E. Warnicke, “Wireshark User’s Guide,” 2004.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">“Turkhackteam,” 2023. Available: https://www.turkhackteam.org/forumlar/siber-guvenlik.538/. [Accessed: Dec. 01, 2023]</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">R. Tekin, “Nesnelerin İnterneti Uygulamaları için Saldırı Tespit Yöntemlerinin Geliştirilmesi,” Fırat Üniversitesi, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">H. Liu and R. Setiono, “Chi2: feature selection and discretization of numeric attributes,” in Proceedings of the International Conference on Tools with Artificial Intelligence, 1995. doi: 10.1109/tai.1995.479783</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">B. Yazıcı, F. Yaslı, H. Y. Gürleyik, and U. O. Turgut, “Veri Madenciliğinde Özellik Seçim Tekniklerinin Bankacılık Verisine Uygulanması Üzerine Araştırma ve Karşılaştırmalı Uygulama,” pp. 72–83, 2015.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">T. Tuncer and F. Ertam, “Neighborhood component analysis and reliefF based survival recognition methods for Hepatocellular carcinoma,” Phys. A Stat. Mech. its Appl., vol. 540, p. 123143, 2020, doi: 10.1016/j.physa.2019.123143</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">O. Yaman, “An automated faults classification method based on binary pattern and neighborhood component analysis using induction motor,” Meas. J. Int. Meas. Confed., 2021, doi: 10.1016/j.measurement.2020.108323</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">T. Tuncer, S. Dogan, and F. Ozyurt, “An automated Residual Exemplar Local Binary Pattern and iterative ReliefF based COVID-19 detection method using chest X-ray image,” Chemom. Intell. Lab. Syst., no. January, 2020.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">K. Kira and L. A. Rendell, “Feature selection problem: traditional methods and a new algorithm,” in Proceedings Tenth National Conference on Artificial Intelligence, 1992, pp. 129–134.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">I. Kononenko, “Estimating attributes: Analysis and extensions of RELIEF,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 1994. doi: 10.1007/3-540-57868-4_57</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">“Display Filter Reference: Internet Protocol Version 4.” Available: https://www.wireshark.org/docs/dfref/i/ip.html. [Accessed: Nov. 15, 2023]</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">“Display Filter Reference: Transmission Control Protocol.” Available: https://www.wireshark.org/docs/dfref/t/tcp.html. [Accessed: Nov. 15, 2023]</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">J. R. Quinlan, “Induction of Decision Trees,” Mach. Learn., 1986, doi: 10.1023/A:1022643204877</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">B. Kamiński, M. Jakubczyk, and P. Szufel, “A framework for sensitivity analysis of decision trees,” Cent. Eur. J. Oper. Res., 2018, doi: 10.1007/s10100-017-0479-6</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">J. Goldberger, S. Roweis, G. Hinton, and R. Salakhutdinov, “Neighbourhood components analysis,” in Advances in Neural Information Processing Systems, 2005.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">M. Melanie, “An introduction to genetic algorithms By Melanie Mitchell. MIT Press, Cambridge, MA. (1996). 205 pages. $30.00,” Comput. Math. with Appl., 1996, doi: 10.1016/S0898-1221(96)90227-8</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">G. D.E., “Genetic algorithms in search, optimization, and machine learning,” Mach. Learn. Reading, Mass, Addison-Wesley Pub. Co, 1998.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
