2022
DOI: 10.3390/jcp3010001
|View full text |Cite
|
Sign up to set email alerts
|

An Investigation to Detect Banking Malware Network Communication Traffic Using Machine Learning Techniques

Abstract: Banking malware are malicious programs that attempt to steal confidential information, such as banking authentication credentials, from users. Zeus is one of the most widespread banking malware variants ever discovered. Since the Zeus source code was leaked, many other variants of Zeus have emerged, and tools such as anti-malware programs exist that can detect Zeus; however, these have limitations. Anti-malware programs need to be regularly updated to recognise Zeus, and the signatures or patterns can only be … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 51 publications
0
2
0
Order By: Relevance
“…Many literatures classified cyber threats in the banking sector into many groups [22] like malware, phishing, distributed denial of service (DDoS), and insider threats. Malware is a type of malicious software designed to infiltrate a system and disrupt its operations [23]. Malware can be used to steal sensitive information, such as user credentials, banking details, and personal information.…”
Section: Literature Surveymentioning
confidence: 99%
“…Many literatures classified cyber threats in the banking sector into many groups [22] like malware, phishing, distributed denial of service (DDoS), and insider threats. Malware is a type of malicious software designed to infiltrate a system and disrupt its operations [23]. Malware can be used to steal sensitive information, such as user credentials, banking details, and personal information.…”
Section: Literature Surveymentioning
confidence: 99%
“…For the most part, commercial NIDS rely on either measurable indicators or calculated thresholds on features, such as packets of data, inter-arrival time, flow size, and other web traffic parameters, to design them in such a way that they function effectively within a specific time window. This allows the commercial NIDS to effectively model the various network traffic parameters [13]. They have a high rate of both false positives as well as false negative alarms, which is a problem for them.…”
Section: • Network-based Intrusion Detection Systems (Nids)mentioning
confidence: 99%