Decentralized Malware Attacks Detection using Blockchain

This research introduces an approach to detect malware attacks using blockchain technology that integrates signature-based and behavioralbased methods. The proposed system uses a decentralized blockchain network to share and store malware signatures and behavioral patterns. This enables faster and m...

Full description

Bibliographic Details
Main Authors: Sheela S., Shalini S., Harsha D., Chandrashekar V.T., Goyal Ayush
Format: Article
Language:English
Published: EDP Sciences 2023-01-01
Series:ITM Web of Conferences
Online Access:https://www.itm-conferences.org/articles/itmconf/pdf/2023/03/itmconf_icdsia2023_03002.pdf
_version_ 1797807642145456128
author Sheela S.
Shalini S.
Harsha D.
Chandrashekar V.T.
Goyal Ayush
author_facet Sheela S.
Shalini S.
Harsha D.
Chandrashekar V.T.
Goyal Ayush
author_sort Sheela S.
collection DOAJ
description This research introduces an approach to detect malware attacks using blockchain technology that integrates signature-based and behavioralbased methods. The proposed system uses a decentralized blockchain network to share and store malware signatures and behavioral patterns. This enables faster and more efficient detection of new malware files. The signature-based method involves storing the signatures in the blockchain and the sharing of the signature of malware files among the user nodes of the p2p blockchain network, while the behavioral-based approach analyzes the behavior and actions of files in a separate virtualized environment to identify suspicious patterns. This system addresses the limitations of conventional signature-based methods, which can be evaded by polymorphic malware, and behavioral-based methods, which may generate false positives. The results of the evaluation indicate that the proposed system achieves high detection rates while maintaining low false positives. Overall, the proposed system offers an effective and efficient approach to malware detection by utilizing the strengths of both signature-based and behavioral-based methods and utilizing the security and transparency benefits of blockchain technology.
first_indexed 2024-03-13T06:25:42Z
format Article
id doaj.art-5ab4d7665944440d82cb92287d73ef28
institution Directory Open Access Journal
issn 2271-2097
language English
last_indexed 2024-03-13T06:25:42Z
publishDate 2023-01-01
publisher EDP Sciences
record_format Article
series ITM Web of Conferences
spelling doaj.art-5ab4d7665944440d82cb92287d73ef282023-06-09T09:24:03ZengEDP SciencesITM Web of Conferences2271-20972023-01-01530300210.1051/itmconf/20235303002itmconf_icdsia2023_03002Decentralized Malware Attacks Detection using BlockchainSheela S.0Shalini S.1Harsha D.2Chandrashekar V.T.3Goyal Ayush4Assistant Professor, Global Academy of Technology, Department of Computer Science and EngineeringAssociate Professor, Global Academy of Technology, Department of Computer Science and EngineeringGlobal Academy of Technology, Department of Computer Science and EngineeringGlobal Academy of Technology, Department of Computer Science and EngineeringGlobal Academy of Technology, Department of Computer Science and EngineeringThis research introduces an approach to detect malware attacks using blockchain technology that integrates signature-based and behavioralbased methods. The proposed system uses a decentralized blockchain network to share and store malware signatures and behavioral patterns. This enables faster and more efficient detection of new malware files. The signature-based method involves storing the signatures in the blockchain and the sharing of the signature of malware files among the user nodes of the p2p blockchain network, while the behavioral-based approach analyzes the behavior and actions of files in a separate virtualized environment to identify suspicious patterns. This system addresses the limitations of conventional signature-based methods, which can be evaded by polymorphic malware, and behavioral-based methods, which may generate false positives. The results of the evaluation indicate that the proposed system achieves high detection rates while maintaining low false positives. Overall, the proposed system offers an effective and efficient approach to malware detection by utilizing the strengths of both signature-based and behavioral-based methods and utilizing the security and transparency benefits of blockchain technology.https://www.itm-conferences.org/articles/itmconf/pdf/2023/03/itmconf_icdsia2023_03002.pdf
spellingShingle Sheela S.
Shalini S.
Harsha D.
Chandrashekar V.T.
Goyal Ayush
Decentralized Malware Attacks Detection using Blockchain
ITM Web of Conferences
title Decentralized Malware Attacks Detection using Blockchain
title_full Decentralized Malware Attacks Detection using Blockchain
title_fullStr Decentralized Malware Attacks Detection using Blockchain
title_full_unstemmed Decentralized Malware Attacks Detection using Blockchain
title_short Decentralized Malware Attacks Detection using Blockchain
title_sort decentralized malware attacks detection using blockchain
url https://www.itm-conferences.org/articles/itmconf/pdf/2023/03/itmconf_icdsia2023_03002.pdf
work_keys_str_mv AT sheelas decentralizedmalwareattacksdetectionusingblockchain
AT shalinis decentralizedmalwareattacksdetectionusingblockchain
AT harshad decentralizedmalwareattacksdetectionusingblockchain
AT chandrashekarvt decentralizedmalwareattacksdetectionusingblockchain
AT goyalayush decentralizedmalwareattacksdetectionusingblockchain