Presentation is loading. Please wait.

Presentation is loading. Please wait.

IASP 470 PROJECT PROPOSAL MALWARE DETECTION

Similar presentations


Presentation on theme: "IASP 470 PROJECT PROPOSAL MALWARE DETECTION"— Presentation transcript:

1 IASP 470 PROJECT PROPOSAL MALWARE DETECTION
BY DELBIS LUCIANO

2 Problem / Description Malware attacks have drastically affect the life of many individuals and harmed many organizations. This type of cyber attack usually performs unwanted activity without the owner’s consent. Malwares such as spyware, ransomware, and adware are stand alone softwares that can easily spread on other machines.

3 Problem / Description (Cont.)
Malware tends to infect a large number of victims and organize themselves into a controlled zombie army, known as a botnet. There is a need for new lightweight and complementary techniques for effective malware prevention.

4 Malware Malwares are stand alone softwares that can easily spread on other machines. Today, malware are the root cause of most internet attacks and unlawful activities. It has become a way for cyber criminals to generate incomes within the last few years.

5 Recent Malware Threads
One of the most common ways black hackers do this is by a ransomware attack where malicious worms are submitted into individuals machines. The worms encrypt the local data and allow the user to get it back only after paying the demanded profit.

6 Recent Malware Threads (Cont)
Another common Malware that is still present is known as “Loyphish”. This is a phishing page that pretends to be a legitimate banking website. They are strongly supported in their design which could lead the user to believe it is the actual bank website.

7 My Approach (Part 1) I plan to come up with a solution in reducing Malware attacks on network environments and social media. First, developing similar vaccines for malware immunization. Research has demonstrated that it is possible to extract a lightweight vaccine from current malware. For this, a prototype system is presented that is AGAMI. After injecting such vaccine on clean machines they can be immune from future infection from the same type of malware.

8 My Approach (Part 2) Classifying traffic on a way that studies the network wide behavior modeling by modeling the interactions of users as a graph. To implement this approach, I will use ENTELECHEIA, a botnet detection method. Along with ENTELECHEIA, I will focus on Identifying parts of malware from networks packets in intrusion detection systems. For this, I will use the Major Block Comparison algorithm to generate malware detection signatures in intrusion detection systems.

9 My Approach (Part 3) MyPageKeeper, a security facebook app with 13k downloads whose main purpose is to (a) quantify the presence of malware on Facebook, and (b) protect end-users.

10 Citations Xu, Automatic Generation of Vaccines for Malware Immunization. Faloutsos, M. Detecting Malware with Graph-based Methods: Traffic Classification, Botnets, and Facebook Scams. Kim, S. Real-time Malware Detection Framework in Intrusion Detection Systems. Lakhwani, D. The Latest Malware Threats That Affected Users Worldwide


Download ppt "IASP 470 PROJECT PROPOSAL MALWARE DETECTION"

Similar presentations


Ads by Google