Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    A Novel Approach towards Windows Malware Detection System Using Deep Neural Networks
    (Elsevier B.V., 2022) Divakarla, U.; Reddy, K.H.K.; Chandrasekaran, K.
    Now-a-day's malicious software is increasing in numbers and at present becomes more harmful for any digital equipment like mobile, tablet, and computers. Traditional techniques like static and dynamic analysis, signature-based detection methods are become absolute and not effective at all. The advanced techniques like code encryption and code packing techniques can be used to hide detection; polymorphic malware is a new class of malware that changes their code structure from time to time to avoid detection, so there is a need for an intelligent system which can efficiently analyze the features of a new, unknown executable file and classify it correctly. There have been learning-based malware detection systems proposed in the literature, but most of those proposed approaches present a high accuracy over a small dataset, whereas the performance is very poor over industry-standard datasets. Operating system like windows is always in prime malware target because of the sheer high number of users. This paper proposes a simple, deep learning-based detection approachthat classifies a specified executable into benign or harmful. It has been trained using EMBER, an industry-level Windows malware dataset and tests with an accuracy of 87.76%. © 2023 The Authors. Published by Elsevier B.V.
  • Item
    DNS Cache Poisoning: Investigating Server and Client-Side Attacks and Mitigation Methods
    (Institute of Electrical and Electronics Engineers Inc., 2023) Chandrasekaran, K.; Divakarla, U.; Srinivasan, K.S.
    DNS cache poisoning is a type of cyber attack that aims to redirect traffic from legitimate websites to malicious ones. In this attack, the attacker modifies the DNS cache of a DNS server, allowing them to redirect requests for legitimate domain names to their own servers. This can result in distribution of malware and phishing attacks. To mitigate the risk of DNS cache poisoning, various techniques such as DNSSEC, source port randomization, and response rate limiting have been developed. This paper provides an overview of DNS cache poisoning, the techniques used to perform the attack, and the countermeasures that can be employed to protect against it. © 2023 IEEE.