Decentralised firewall for malware detection

被引:0
|
作者
Raje, Saurabh [1 ]
Vaderia, Shyamal [1 ]
Wilson, Neil [1 ]
Panigrahi, Rudrakh [2 ]
机构
[1] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani, Rajasthan, India
[2] Birla Inst Technol & Sci, Dept Elect & Elect Engn, Pilani, Rajasthan, India
关键词
Malware; Blockchain consensus; Portable Executable; Deep belief network; Restricted Boltzmann machine;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the design and development of a decentralized firewall system powered by a novel malware detection engine. The firewall is built using blockchain technology. The detection engine aims to classify Portable Executable (PE) files as malicious or benign. File classification is carried out using a deep belief neural network (DBN) as the detection engine. Our approach is to model the files as grayscale images and use the DBN to classify those images into the aforementioned two classes. An extensive data set of 10,000 files is used to train the DBN. Validation is carried out using 4,000 files previously unexposed to the network. The final result of whether to allow or block a file is obtained by arriving at a proof of work based consensus in the blockchain network.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Smart malware detection on Android
    Gheorghe, Laura
    Marin, Bogdan
    Gibson, Gary
    Mogosanu, Lucian
    Deaconescu, Razvan
    Voiculescu, Valentin-Gabriel
    Carabas, Mihai
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4254 - 4272
  • [32] TRENDS IN ANDROID MALWARE DETECTION
    Shaerpour, Kaveh
    Dehghantanha, Ali
    Mahmod, Ramlan
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2013, 8 (03) : 21 - 40
  • [33] Vigenere scores for malware detection
    Deshmukh, Suchita
    Di Troia, Fabio
    Stamp, Mark
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2018, 14 (02) : 157 - 165
  • [34] Using IRP for Malware Detection
    Zhang, FuYong
    Qi, De Yu
    Hu, JingLin
    RECENT ADVANCES IN INTRUSION DETECTION, 2010, 6307 : 514 - 515
  • [35] On Benign Features in Malware Detection
    Cao, Michael
    Badihi, Sahar
    Ahmed, Khaled
    Xiong, Peiyu
    Rubin, Julia
    2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING (ASE 2020), 2020, : 1234 - 1238
  • [36] Code graph for malware detection
    Jeong, Kyoochang
    Lee, Heejo
    2008 THE INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2008, : 137 - +
  • [37] Detection of Mobile Malware in the Wild
    Chandramohan, Mahinthan
    Tan, Hee Beng Kuan
    COMPUTER, 2012, 45 (09) : 65 - 71
  • [38] The Malware Detection Challenge of Accuracy
    Akour, Mohammad
    Alsmadi, Izzat
    Alazab, Mamoun
    2016 2ND INTERNATIONAL CONFERENCE ON OPEN SOURCE SOFTWARE COMPUTING (OSSCOM), 2016,
  • [39] Generative Malware Outbreak Detection
    Park, Sean
    Gondal, Iqbal
    Kamruzzaman, Joarder
    Oliver, Jon
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 1149 - 1154
  • [40] System anomaly detection: Mining firewall logs
    Winding, Robert
    Wright, Timothy
    Chapple, Michael
    2006 SECURECOMM AND WORKSHOPS, 2006, : 389 - +