Decentralised firewall for malware detection

被引:0
|
作者
Raje, Saurabh [1 ]
Vaderia, Shyamal [1 ]
Wilson, Neil [1 ]
Panigrahi, Rudrakh [2 ]
机构
[1] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani, Rajasthan, India
[2] Birla Inst Technol & Sci, Dept Elect & Elect Engn, Pilani, Rajasthan, India
关键词
Malware; Blockchain consensus; Portable Executable; Deep belief network; Restricted Boltzmann machine;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the design and development of a decentralized firewall system powered by a novel malware detection engine. The firewall is built using blockchain technology. The detection engine aims to classify Portable Executable (PE) files as malicious or benign. File classification is carried out using a deep belief neural network (DBN) as the detection engine. Our approach is to model the files as grayscale images and use the DBN to classify those images into the aforementioned two classes. An extensive data set of 10,000 files is used to train the DBN. Validation is carried out using 4,000 files previously unexposed to the network. The final result of whether to allow or block a file is obtained by arriving at a proof of work based consensus in the blockchain network.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Malware Detection with Malware Images using Deep Learning Techniques
    He, Ke
    Kim, Dong Seong
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 95 - 102
  • [22] Metamorphic Detection of Repackaged Malware
    Singh, Shirish
    Kaiser, Gail
    2021 IEEE/ACM 6TH INTERNATIONAL WORKSHOP ON METAMORPHIC TESTING (MET 2021), 2021, : 9 - 16
  • [23] A New Approach to Malware Detection
    Tang, Hongying
    Zhu, Bo
    Ren, Kui
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 229 - +
  • [24] Malware Detection by Token Counting
    Poonia, Ajeet Singh
    Singh, Shivraj
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1285 - 1288
  • [25] Deep Android Malware Detection
    McLaughlin, Niall
    del Rincon, Jesus Martinez
    Kang, BooJoong
    Yerima, Suleiman
    Miller, Paul
    Sezer, Sakir
    Safaei, Yeganeh
    Trickel, Erik
    Zhao, Ziming
    Doup, Adam
    Ahn, Gail Joon
    PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 301 - 308
  • [26] Malware Detection in Cloud Computing
    Hatem, Safaa Salam
    Wafy, Maged H.
    El-Khouly, Mahmoud M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (04) : 187 - 192
  • [27] Detection of Repackaged Android Malware
    Shahriar, Hossain
    Clincy, Victor
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 349 - 354
  • [28] A mechanism of intrusion detection system cooperating with firewall
    Cao, Zijian
    Rong, Xiaofeng
    Cao, Z., 2013, Asian Network for Scientific Information (12) : 6449 - 6454
  • [29] Firewall filtering rules analysis for anomalies detection
    Bouhoula, Adel
    Trabelsi, Zouheir
    Barka, Ezedin
    Benelbahri, Mohammed-Anis
    International Journal of Security and Networks, 2008, 3 (03) : 161 - 172
  • [30] An Advanced Algorithm for Malware Detection
    Khan, Gousia Hazra Anjun
    Dewangan, Kranti Kumar
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,