Honeypot-Based Thread Detection using Machine Learning Techniques

Honeypot-Based Thread Detection using Machine Learning Techniques

  IJETT-book-cover           
  
© 2023 by IJETT Journal
Volume-71 Issue-8
Year of Publication : 2023
Author : Diandra Amiruddin Firmansyah, Amalia Zahra
DOI : 10.14445/22315381/IJETT-V71I8P221

How to Cite?

Diandra Amiruddin Firmansyah, Amalia Zahra, "Honeypot-Based Thread Detection using Machine Learning Techniques," International Journal of Engineering Trends and Technology, vol. 71, no. 8, pp. 243-252, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I8P221

Abstract
This paper explores the application of machine learning techniques to honeypot-based thread detection in cybersecurity. Honeypot is a decoy system designed to lure attackers and gather information about their methods and objectives. Honeypot-based thread detection is a proactive approach to cybersecurity that can identify and prevent attacks before they cause damage. However, the sheer volume of data generated by honeypots can be overwhelming for human analysts. In this context, machine learning techniques can help automate the analysis of honeypot data and improve threat detection accuracy. The performance is evaluated using real-world honeypot data. Based on the experiment results, the Random Forest algorithm demonstrated superior performance compared to other algorithms, with an accuracy rate of 99.20% for detecting malware. The results show that machine learning can significantly enhance the effectiveness of honeypot-based thread detection, enabling cybersecurity analysts to identify and respond to threats more quickly and efficiently.

Keywords
Malware, Machine learning, Honeypot.

References
[1] Hassan Naderi et al., “Malware Signature Generation Using Locality Sensitive Hashing,” Communications in Computer and Information Science, pp. 115–124, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Attacks Every Few Seconds: Around 100 Malware Variants Per Minute Threaten IT Security, 2023. [Online]. Available: https://presse.gdata.de/news--attacks-every-few-seconds-around-100-malware-variants-per-minute-threaten-it-security?id=174381&menueid=28982&l=english
[3] Vasileios Kouliaridis et al., “A Survey on Mobile Malware Detection Techniques,” IEICE Transactions on Information and Systems, vol. E103.D, no. 2, pp. 204–211, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Gerardo Fernandez, Lesson Learned from 2022, 2023. [Online]. Available: https://blog.virustotal.com/2023/01/lessons-learned-from-2022.html
[5] Leyi Shi et al., “Dynamic Distributed Honeypot Based on Blockchain,” IEEE Access, vol. 7, pp. 72234–72246, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Seungjin Lee et al., “Classification of Botnet Attacks in IoT Smart Factory using Honeypot Combined with Machine Learning,” PeerJ Computer Science, vol. 7, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Cheng Huang et al., “Automatic Identification of Honeypot Server Using Machine Learning Techniques,” Security and Communication Networks, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Rejwana Islam et al., “Android Malware Classification using Optimum Feature Selection and Ensemble Machine Learning,” Internet of Things and Cyber-Physical Systems, vol. 3, pp. 100–111, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Hemashu Kamboj, and Gurpreet Singh, “Fake Access Point Detection and Prevention Techniques,” International Journal of P2P Network Trends and Technology, vol. 3, no. 2, pp. 34-36, 2013.
[Google Scholar] [Publisher Link]
[10] Md. Haris Uddin Sharif et al., “Comparative Study of Prognosis of Malware with PE Headers Based Machine Leaning Techniques,” 2023 International Conference on Smart Computing and Application, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Muhammad Shairoze Malik, “The Machine Learning in Malware Detection,” International Journal for Electronic Crime Investigation, vol. 5, no. 3, 2021.
[CrossRef] [Publisher Link]
[12] Iik Muhamad Malik Matin, and Budi Rahardjo, “Malware Detection Using Honeypot and Machine Learning,” 2019 7th International Conference on Cyber and IT Service Management, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Sonali Tidke, and Pravin Karde, “Design Methodology of Botnet Attack for Smartphone,” SSRG International Journal of Computer Science and Engineering, vol. 2, no. 5, pp. 11-15, 2015.
[CrossRef] [Publisher Link]
[14] Ravi Kiran Varma Penmatsa, Akhila Kalidindi, and S. Kumar Reddy Mallidi, “Feature Reduction and Optimization of Malware Detection System Using Ant Colony Optimization and Rough Sets,” International Journal of Information Security and Privacy, vol. 14, no. 3, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Tobias Wuchner et al., “Leveraging Compression-Based Graph Mining for Behavior-Based Malware Detection,” IEEE Transactions Dependable Secure Computing, vol. 16, no. 1, pp. 99–112, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Abrar Hussain et al., “Malware Detection Using Machine Learning Algorithms for Windows Platform,” Lecture Notes in Networks and Systems, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Ajit Kumar, K.S. Kuppusamy, and G. Aghila, “A Learning Model to Detect Maliciousness of Portable Executable using Integrated Feature Set,” Journal of King Saud University - Computer and Information Sciences, vol. 31, no. 2, pp. 252–265, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Ryandy Djap et al., “XB-Pot: Revealing Honeypot-based Attacker’s Behaviors,” 2021 9th International Conference on Information and Communication Technology, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[19] K. Iswarya, “Security Issues Associated With Big Data in Cloud Computing,” SSRG International Journal of Computer Science and Engineering, vol. 1, no. 8, pp. 1-5, 2014.
[CrossRef] [Publisher Link]
[20] Daniel Gibert, Carles Mateu, and Jordi Planes, “The Rise of Machine Learning for Detection and Classification of Malware: Research Developments, Trends and Challenges,” Journal of Network and Computer Applications, vol. 153, p. 102526, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Davide Chicco, and Giuseppe Jurman, “The Advantages of the Matthews Correlation Coefficient (MCC) Over F1 Score and Accuracy in Binary Classification Evaluation,” BMC Genomics, vol. 21, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[22] Muhammad Ijaz, Muhammad Hanif Durad, and Maliha Ismail, “Static and Dynamic Malware Analysis Using Machine Learning,” 2019 16th International Bhurban Conference on Applied Sciences and Technology, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[23] Syed Khurram Jah Rizvi et al., “PROUD-MAL: Static Analysis-based Progressive Framework for Deep Unsupervised Malware Classification of Windows Portable Executable,” Complex & Intelligent Systems, vol. 8, pp. 673–685, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[24] Mozammel Chowdhury, Azizur Rahman, and Rafiqul Islam, “Malware Analysis and Detection Using Data Mining and Machine Learning Classification,” Advances in Intelligent Systems and Computing, pp. 266–274, 2018.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Akram M. Radwan, “Machine Learning Techniques to Detect Maliciousness of Portable Executable Files,” 2019 International Conference on Promising Electronic Technologies, 2019.
[CrossRef] [Google Scholar] [Publisher Link]