2022
DOI: 10.1504/ijguc.2022.126167
|View full text |Cite
|
Sign up to set email alerts
|

Comparing the performance of supervised machine learning algorithms when used with a manual feature selection process to detect Zeus malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…The framework analyses the characteristics of network traffic produced by the Trojans and identifies its patterns using machine learning algorithms. Similarly, the authors in [14] looked into the use of machine learning methods to identify network communication traffic from banking malware. The decision tree and random forest algorithms were successful in identifying the malware traffic after they compared various classification algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…The framework analyses the characteristics of network traffic produced by the Trojans and identifies its patterns using machine learning algorithms. Similarly, the authors in [14] looked into the use of machine learning methods to identify network communication traffic from banking malware. The decision tree and random forest algorithms were successful in identifying the malware traffic after they compared various classification algorithms.…”
Section: Related Workmentioning
confidence: 99%
“…The first figure shows the various stages of the Command-and-control communication discussed by Preethi and Asokan [8]. This communication can occur using either a centrally controlled architecture or a mentoring architecture, with the latter being extra Strong and resilient [2]. This is because the ZBot bots won't be able to receive commands, update software, or download new configuration files from the Command-and-control server if that server goes down or isn't available [10].…”
Section: Architecture Of the Zbot Malwarementioning
confidence: 99%
“…According to [2], ZBot behaves like a virus and spreads mostly through spam schemes, making it one of the most common ways malware is disseminated and infects Windows computers. Ref.…”
Section: Architecture Of the Zbot Malwarementioning
confidence: 99%
See 1 more Smart Citation
“…Stolen data is routed through the C&C network to the mal ware authors' C&C server, where the stolen data is decrypted and saved to a database [19]. As discussed by [20], Zeus propagates like a virus, mainly infecting Windows systems and predominantly, the infection vector occurs via phishing emails, which is a significant distribution mechanism for malware. Research by [21] has discussed this in detail, and states that around 90 percent of data breaches are caused by phishing.…”
Section: Zeus Malware Architecturementioning
confidence: 99%