Malware Detection Using Honeypot and Machine Learning
Title | Malware Detection Using Honeypot and Machine Learning |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Matin, Iik Muhamad Malik, Rahardjo, Budi |
Conference Name | 2019 7th International Conference on Cyber and IT Service Management (CITSM) |
ISBN Number | 978-1-7281-2909-9 |
Keywords | Adware malware, computer malware, computer viruses, Decision Tree, Decision trees, digital signatures, firewalls, honey pots, honeypot, human factors, invasive software, learning (artificial intelligence), machine learning, Malware, malware detection, Measurement, Metrics, privacy, pubcrawl, Resiliency, Scalability, signature-based security systems, support vector machine, Support vector machines, SVM, threat vectors, Trojan Horse malware |
Abstract | Malware is one of the threats to information security that continues to increase. In 2014 nearly six million new malware was recorded. The highest number of malware is in Trojan Horse malware while in Adware malware is the most significantly increased malware. Security system devices such as antivirus, firewall, and IDS signature-based are considered to fail to detect malware. This happens because of the very fast spread of computer malware and the increasing number of signatures. Besides signature-based security systems it is difficult to identify new methods, viruses or worms used by attackers. One other alternative in detecting malware is to use honeypot with machine learning. Honeypot can be used as a trap for packages that are suspected while machine learning can detect malware by classifying classes. Decision Tree and Support Vector Machine (SVM) are used as classification algorithms. In this paper, we propose architectural design as a solution to detect malware. We presented the architectural proposal and explained the experimental method to be used. |
URL | https://ieeexplore.ieee.org/document/8965419 |
DOI | 10.1109/CITSM47753.2019.8965419 |
Citation Key | matin_malware_2019 |
- malware
- Trojan Horse malware
- threat vectors
- SVM
- Support vector machines
- support vector machine
- signature-based security systems
- Scalability
- Resiliency
- pubcrawl
- privacy
- Metrics
- Measurement
- malware detection
- Adware malware
- machine learning
- learning (artificial intelligence)
- invasive software
- Human Factors
- honey pots
- honeypot
- firewalls
- digital signatures
- Decision trees
- Decision Tree
- computer viruses
- computer malware