Decentralised firewall for malware detection

被引:0
|
作者
Raje, Saurabh [1 ]
Vaderia, Shyamal [1 ]
Wilson, Neil [1 ]
Panigrahi, Rudrakh [2 ]
机构
[1] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani, Rajasthan, India
[2] Birla Inst Technol & Sci, Dept Elect & Elect Engn, Pilani, Rajasthan, India
关键词
Malware; Blockchain consensus; Portable Executable; Deep belief network; Restricted Boltzmann machine;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the design and development of a decentralized firewall system powered by a novel malware detection engine. The firewall is built using blockchain technology. The detection engine aims to classify Portable Executable (PE) files as malicious or benign. File classification is carried out using a deep belief neural network (DBN) as the detection engine. Our approach is to model the files as grayscale images and use the DBN to classify those images into the aforementioned two classes. An extensive data set of 10,000 files is used to train the DBN. Validation is carried out using 4,000 files previously unexposed to the network. The final result of whether to allow or block a file is obtained by arriving at a proof of work based consensus in the blockchain network.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] MalFire: Malware Firewall for Malicious Content Detection and Protection
    Yost, Wyatt
    Jaiswal, Chetan
    2017 IEEE 8TH ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (UEMCON), 2017, : 428 - +
  • [2] Hydras and IPFS: a decentralised playground for malware
    Patsakis, Constantinos
    Casino, Fran
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (06) : 787 - 799
  • [3] Hydras and IPFS: a decentralised playground for malware
    Constantinos Patsakis
    Fran Casino
    International Journal of Information Security, 2019, 18 : 787 - 799
  • [4] Software-Defined Firewall: Enabling Malware Traffic Detection and Programmable Security Control
    Gao, Shang
    Li, Zecheng
    Yao, Yuan
    Xiao, Bin
    Guo, Songtao
    Yang, Yuanyuan
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 413 - 424
  • [5] The Method of Detecting Malware-Infected Hosts Analyzing Firewall and Proxy Logs
    Kamiya, Kazunori
    Aoki, Kazufumi
    Nakata, Kensuke
    Sato, Toru
    Kurakami, Hiroshi
    Tanikawa, Masaki
    2015 10th Asia-Pacific Symposium on Information and Telecommunication Technologies (APSITT), 2015,
  • [6] Detection and removal of firewall misconfiguration
    Cuppens, Frederic
    Cuppens-Boulahia, Nora
    Garcia-Alfaro, Joaquin
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 154 - 161
  • [7] Intra Firewall Anomaly Policies Detection in Cloud Environment Using Firewall Tree
    Dhwani Hakani
    Palvinder Singh Mann
    Transactions of the Indian National Academy of Engineering, 2025, 10 (1) : 63 - 72
  • [8] Distributed Firewall with Intrusion Detection System
    Xie, Linquan
    Yu, Fei
    Xu, Chen
    JOURNAL OF COMPUTERS, 2012, 7 (12) : 3110 - 3115
  • [9] Proactive Malware Detection
    Gloster, Jonathan
    Diep, Michael
    Dredden, David
    Mix, Matthew
    Olsen, Mark
    Price, Brian
    Steil, Betty
    CYBER SENSING 2014, 2014, 9097
  • [10] Polymorphic Malware Detection
    Selamat, Nur Syuhada
    Ali, Fakariah Hani Mohd
    Abu Othman, Noor Ashitah
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 274 - 278