Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A Meta-Classification Model for Optimized ZBot Malware Prediction Using Learning Algorithms

View through CrossRef
Botnets pose a real threat to cybersecurity by facilitating criminal activities like malware distribution, attacks involving distributed denial of service, fraud, click fraud, phishing, and theft identification. The methods currently used for botnet detection are only appropriate for specific botnet commands and control protocols; they do not endorse botnet identification in early phases. Security guards have used honeypots successfully in several computer security defence systems. Honeypots are frequently utilised in botnet defence because they can draw botnet compromises, reveal spies in botnet membership, and deter attacker behaviour. Attackers who build and maintain botnets must devise ways to avoid honeypot traps. Machine learning methods support identification and inhibit bot threats to address the problems associated with botnet attacks. To choose the best features to feed as input to the machine learning classifiers to estimate the performance of botnet detection, a Kernel-based Ensemble Meta Classifier (KEMC) Strategy is suggested in this work. And particle swarm optimization (PSO) and genetic algorithm (GA) intelligent optimization algorithms are used to establish the ideal order. The model covered in this paper is employed to forecast Internet cyber security circumstances. The Binary Cross-Entropy (loss), the GA-PSO optimizer, the Softsign activation functions and ensembles were used in the experiment to produce the best results. The model succeeded because Forfileless malware, gathered from well-known datasets, achieved a total accuracy of 93.3% with a True Positive (TP) Range of 87.45% at zero False Positive (FP).
Title: A Meta-Classification Model for Optimized ZBot Malware Prediction Using Learning Algorithms
Description:
Botnets pose a real threat to cybersecurity by facilitating criminal activities like malware distribution, attacks involving distributed denial of service, fraud, click fraud, phishing, and theft identification.
The methods currently used for botnet detection are only appropriate for specific botnet commands and control protocols; they do not endorse botnet identification in early phases.
Security guards have used honeypots successfully in several computer security defence systems.
Honeypots are frequently utilised in botnet defence because they can draw botnet compromises, reveal spies in botnet membership, and deter attacker behaviour.
Attackers who build and maintain botnets must devise ways to avoid honeypot traps.
Machine learning methods support identification and inhibit bot threats to address the problems associated with botnet attacks.
To choose the best features to feed as input to the machine learning classifiers to estimate the performance of botnet detection, a Kernel-based Ensemble Meta Classifier (KEMC) Strategy is suggested in this work.
And particle swarm optimization (PSO) and genetic algorithm (GA) intelligent optimization algorithms are used to establish the ideal order.
The model covered in this paper is employed to forecast Internet cyber security circumstances.
The Binary Cross-Entropy (loss), the GA-PSO optimizer, the Softsign activation functions and ensembles were used in the experiment to produce the best results.
The model succeeded because Forfileless malware, gathered from well-known datasets, achieved a total accuracy of 93.
3% with a True Positive (TP) Range of 87.
45% at zero False Positive (FP).

Related Results

Dynamic Features for Robust Malware Detection: A Systematic Review, Taxonomy, and Practical Analysis Framework
Dynamic Features for Robust Malware Detection: A Systematic Review, Taxonomy, and Practical Analysis Framework
The need to mitigate malware attacks cannot be overemphasized, as they pose serious threats to the critical information assets in cyberspace. Understanding and utilizing appropriat...
MCPDS: image-based malware classification method using PE metadata alone
MCPDS: image-based malware classification method using PE metadata alone
Abstract In response to the increasing threat posed by the exponential growth of malware in cybersecurity, researchers have developed a numbe...
Android Malware Detection Techniques: A Literature Review
Android Malware Detection Techniques: A Literature Review
Objective: This paper provides the basics of Android malware, its evolution and tools and techniques for malware analysis. Its main aim is to present a review of the literature on ...
An optimal deep learning-based framework for the detection and classification of android malware
An optimal deep learning-based framework for the detection and classification of android malware
 The use of smartphones is increasing rapidly and the malicious intrusions associated with it have become a challenging task that needs to be resolved. A secure and effective techn...
Malware and Windows APIs: A Dangerous Duo
Malware and Windows APIs: A Dangerous Duo
This paper introduces its interaction with malware and Windows APIs (application programming interface). The first section describes malware and investigates various types such as ...
AndroDex: Android Dex Images of Obfuscated Malware
AndroDex: Android Dex Images of Obfuscated Malware
AbstractWith the emergence of technology and the usage of a large number of smart devices, cyber threats are increasing. Therefore, research studies have shifted their attention to...
Malware Detection using Deep Learning
Malware Detection using Deep Learning
Malicious software or malware continues to pose a major security concern in this digital age as computer users, corporations, and governments witness an exponential growth in malwa...
ACMFNN: Design of an augmented convolutional model for intelligent cross-domain malware localization via forensic neural networks
ACMFNN: Design of an augmented convolutional model for intelligent cross-domain malware localization via forensic neural networks
Abstract Classification of malwares from spatial & temporal data patterns requires efficient design of deep learning models. These models deploy methods for feature ext...

Back to Top