2020
DOI: 10.25008/ijadis.v1i1.14
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Malware Impact on Network Traffic using Behavior-based Detection Technique

Abstract: Malware is a software or computer program that is used to carry out malicious activity. Malware is made with the aim of harming user’s device because it can change user’s data, use up bandwidth and other resources without user's permission. Some research has been done before to identify the type of malware and its effects. But previous research only focused on grouping the types of malware that attack via network traffic. This research analyzes the impact of malware on network traffic using behavior-based dete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 14 publications
0
4
0
1
Order By: Relevance
“…This method allows academics and practitioners to objectively quantify the effectiveness of their algorithms. The use of this benchmark enables an equitable evaluation of various methodologies and encourages progress in the field of anomaly detection specifically in the domain of time-series data analysis [81].…”
Section: Numenta Anomaly Benchmark (Nab)mentioning
confidence: 99%
“…This method allows academics and practitioners to objectively quantify the effectiveness of their algorithms. The use of this benchmark enables an equitable evaluation of various methodologies and encourages progress in the field of anomaly detection specifically in the domain of time-series data analysis [81].…”
Section: Numenta Anomaly Benchmark (Nab)mentioning
confidence: 99%
“…It is an analysis that assesses the behavior of an object. Behavior-based detection can be performed by using API call logs [24], network flow (NetFlow) [10], and is also a hybrid between API call and Netflow [25]. A flow is a collection of packets that come from the same source and destination.…”
Section: Behavior-based and Flow-based Featuresmentioning
confidence: 99%
“…Flow-based botnet detection techniques employ statistics of all packet headers in a flow (flow record). Because the flow-https://doi.org/10.31436/iiumej.v23i1.1789 based approach only catches packet header information, it can reduce the computational complexity [24][25][26] and be processed very quickly.…”
Section: Behavior-based and Flow-based Featuresmentioning
confidence: 99%
“…Backdoor works by entering the system and accessing files illegally. This malware will let users connect to the system and then will attack network traffic to get a password [21][22][23][24].…”
Section: Malware Classificationmentioning
confidence: 99%