Explore chapters and articles related to this topic
Advanced Attack Detection and Prevention Systems by Using Botnet
Published in Monika Mangla, Ashok Kumar, Vaishali Mehta, Megha Bhushan, Sachi Nandan Mohanty, Real-Life Applications of the Internet of Things, 2022
Anjanna Matta, Altaf Ahmad, Shantanu Bhattacharya, Shubham Kumar
The Zeus malware software is one of the best known and widely used malware types in the history of information security was first detected in 2007. By using botnets, Zeus is a Trojan horse for windows that was created to steal bank information. It extends through email, downloads, and online messaging to users across the globe. Zeus botnets create a group of millions of zombie computers to target bank accounts, private data, and saved account passwords for his own purpose or mission. They used this data for online fraud of debit cards, identity theft and many more. In 2007 survey more than 3.6 million computers cases are reported in the United States. In the below paragraph, it will discuss about process of installation, infection, and bot building.
PHMM Applications
Published in Mark Stamp, Introduction to Machine Learning with Applications in Information Security, 2017
For the experiments in this section, we use the following seven Windows malware families. Cridex is a worm that multiplies and spreads through removable drives. It downloads malicious programs onto systems that it infects [149].Harebot is a backdoor that enables hackers to gain access to a compromised system and steal information. Harebot is a rootkit [59].Security Shield is fake antivirus software that claims it will protect a system from malware. Security Shield tries to convince the user to pay money to remove nonexistent threats [122].Smart HDD reports various non-existent problems with the hard drive and tries to convince the user to purchase a product to fix the “errors.” The name Smart HDD is intended to be confused with S.M.A.R.T., which is a legitimate tool for monitoring hard disk drives; thus the “HDD” in Smart HDD [72, 132].Winwebsec is a Windows Trojan that pretends to be antivirus software. Winwebsec displays messages claiming that the user’s system has been infected, and it tries to convince the user to pay for a fake antivirus product [165].Zbot is a Trojan horse that compromises a system by downloading configuration files or updates. Also known as Zeus, the Zbot malware steals confidential information, such as online credentials [150].Zeroaccess is a Trojan horse that makes use of an advanced rootkit to hide itself. ZeroAccess generates a hidden file system, creates a backdoor on a compromised system, and it is capable of downloading additional malware [151].
An Optimal Reinforced Deep Belief Network for Detection of Malicious Network Traffic
Published in IETE Journal of Research, 2023
The overall architecture of the proposed methodology is presented in Figure 1. Initially, the input traffic flow is taken from the USTC-TFC 2016 dataset and it is preprocessed using different steps. After the noise removal, the DSO-RDBN model classifies the network traffic into benign and malicious. The normal data traffic is the one generated by the applications that users use daily such as facetime, File Transfer Protocol (FTP), skype, Server Message Block (SMB), Weibo, outlook, facetime, skype, MySQL, and Gmail. The malware programs such as miuref, Neris, nsis-ay, Shifu, tinba, virut, Zeus, cridex, htbot, and geodo fall under the malicious traffic class. The DSO algorithm is used to optimize the DSO-RDBN structure and the details of these processes are presented in the subsection below.