Visible to the public Malware Detection Using Honeypot and Machine Learning

TitleMalware Detection Using Honeypot and Machine Learning
Publication TypeConference Paper
Year of Publication2019
AuthorsMatin, Iik Muhamad Malik, Rahardjo, Budi
Conference Name2019 7th International Conference on Cyber and IT Service Management (CITSM)
ISBN Number978-1-7281-2909-9
KeywordsAdware malware, computer malware, computer viruses, Decision Tree, Decision trees, digital signatures, firewalls, honey pots, honeypot, human factors, invasive software, learning (artificial intelligence), machine learning, Malware, malware detection, Measurement, Metrics, privacy, pubcrawl, Resiliency, Scalability, signature-based security systems, support vector machine, Support vector machines, SVM, threat vectors, Trojan Horse malware
Abstract

Malware is one of the threats to information security that continues to increase. In 2014 nearly six million new malware was recorded. The highest number of malware is in Trojan Horse malware while in Adware malware is the most significantly increased malware. Security system devices such as antivirus, firewall, and IDS signature-based are considered to fail to detect malware. This happens because of the very fast spread of computer malware and the increasing number of signatures. Besides signature-based security systems it is difficult to identify new methods, viruses or worms used by attackers. One other alternative in detecting malware is to use honeypot with machine learning. Honeypot can be used as a trap for packages that are suspected while machine learning can detect malware by classifying classes. Decision Tree and Support Vector Machine (SVM) are used as classification algorithms. In this paper, we propose architectural design as a solution to detect malware. We presented the architectural proposal and explained the experimental method to be used.

URLhttps://ieeexplore.ieee.org/document/8965419
DOI10.1109/CITSM47753.2019.8965419
Citation Keymatin_malware_2019