Decentralised firewall for malware detection

被引:0
|
作者
Raje, Saurabh [1 ]
Vaderia, Shyamal [1 ]
Wilson, Neil [1 ]
Panigrahi, Rudrakh [2 ]
机构
[1] Birla Inst Technol & Sci, Dept Comp Sci & Informat Syst, Pilani, Rajasthan, India
[2] Birla Inst Technol & Sci, Dept Elect & Elect Engn, Pilani, Rajasthan, India
关键词
Malware; Blockchain consensus; Portable Executable; Deep belief network; Restricted Boltzmann machine;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes the design and development of a decentralized firewall system powered by a novel malware detection engine. The firewall is built using blockchain technology. The detection engine aims to classify Portable Executable (PE) files as malicious or benign. File classification is carried out using a deep belief neural network (DBN) as the detection engine. Our approach is to model the files as grayscale images and use the DBN to classify those images into the aforementioned two classes. An extensive data set of 10,000 files is used to train the DBN. Validation is carried out using 4,000 files previously unexposed to the network. The final result of whether to allow or block a file is obtained by arriving at a proof of work based consensus in the blockchain network.
引用
收藏
页数:5
相关论文
共 50 条
  • [41] Generative Malware Outbreak Detection
    Park, Sean
    Gondal, Iqbal
    Kamruzzaman, Joarder
    Oliver, Jon
    2019 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY (ICIT), 2019, : 1149 - 1154
  • [42] Malware Detection Modeling Systems
    Kumar, Rajesh
    Geetha, S.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 187 - 192
  • [43] Towards stealthy malware detection
    Stolfo, Salvatore J.
    Wang, Ke
    Li, Wei-Jen
    MALWARE DETECTION, 2007, : 231 - +
  • [44] Inductive Learning in Malware Detection
    Liu PeiShun
    Wang XueFang
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12538 - 12541
  • [45] Adversarial Examples for Malware Detection
    Grosse, Kathrin
    Papernot, Nicolas
    Manoharan, Praveen
    Backes, Michael
    McDaniel, Patrick
    COMPUTER SECURITY - ESORICS 2017, PT II, 2017, 10493 : 62 - 79
  • [46] Android malware detection model
    Yang H.
    Na Y.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (03): : 45 - 51
  • [47] Android Fragmentation in Malware Detection
    Long Nguyen-Vu
    Ahn, Jinung
    Jung, Souhwan
    COMPUTERS & SECURITY, 2019, 87
  • [48] Malytics: A Malware Detection Scheme
    Yousefi-Azar, Mahmood
    Hamey, Leonard G. C.
    Varadharajan, Vijay
    Chen, Sniping
    IEEE ACCESS, 2018, 6 : 49418 - 49431
  • [49] Malware Detection using Anomaly Detection Algorithms
    Buriro, Attaullah
    Rafi, Arslan
    Yaqub, Muhammad Azfar
    Luccio, Flaminia
    2024 FIFTEENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS, ICUFN 2024, 2024, : 330 - 335
  • [50] From Plagiarism to Malware Detection
    Oprisa, Ciprian
    Cabau, George
    Colesa, Adrian
    2013 15TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2013), 2014, : 227 - 234