An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques
نویسندگان
چکیده
Banking malware are malicious programs that attempt to steal confidential information, such as banking authentication credentials, from users. Zeus is one of the most widespread variants ever discovered. Since source code was leaked, many other have emerged, and tools anti-malware exist can detect Zeus; however, these limitations. Anti-malware need be regularly updated recognise Zeus, signatures or patterns only made available when has been seen. This limits capability products because they unable unseen variants, furthermore, users developing seeks evade signature-based programs. In this paper, a methodology proposed for detecting network traffic flows by using machine learning (ML) binary classification algorithms. research explores compares several ML algorithms determine algorithm best suited problem then uses conduct further experiments minimum number features could used malware. also suitability both older newer versions well additional will help researchers understand which flow whether work across multiple
منابع مشابه
Android Malware Characterization using Metadata and Machine Learning Techniques
Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to identify patterns in malware applications. Our experiments show that: (1) the permissions used by an application offer only moderate performance...
متن کاملA Review on Malware Detection Schemes Using Machine Learning Techniques
Malware is a one type of software which can harm the computer’s operating system and it may also steal the personal information from the computer. Malware can be made by using any programming language by the programmer. It is very difficult to define a malware with a single term or a single name. A malware can be considered as a malicious software or malcode or it is also known as a malicious c...
متن کاملMachine learning based mobile malware detection using highly imbalanced network traffic
In recent years, the number and variety of malicious mobile apps have increased drastically, especially on Android platform, which brings insurmountable challenges for malicious app detection. Researchers endeavor to discover the traces of malicious apps using network traffic analysis. In this study, we combine network traffic analysis with machine learning methods to identify malicious network...
متن کاملUsing Machine Learning Techniques to Identify Botnet Traffic
To date, techniques to counter cyber-attacks have predominantly been reactive; they focus on monitoring network traffic, detecting anomalies and cyber-attack traffic patterns, and, a posteriori, combating the cyber-attacks and mitigating their effects. Contrary to such approaches, we advocate proactively detecting and identifying botnets prior to their being used as part of a cyber-attack [12]....
متن کاملAn Improved Method to Detect Intrusion Using Machine Learning Algorithms
An intrusion detection system detects various malicious behaviors and abnormal activities that might harm security and trust of computer system. IDS operate either on host or network level via utilizing anomaly detection or misuse detection. Main problem is to correctly detect intruder attack against computer network. The key point of successful detection of intrusion is choice of proper featur...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of cybersecurity and privacy
سال: 2022
ISSN: ['2624-800X']
DOI: https://doi.org/10.3390/jcp3010001