2 LITERATURE REVIEW
In the first place Liu, Tang and Qin analyze
authentication challenges in software defined optical
access networks where optical line terminals and
optical network units are critically growing and it
requires stronger security measures. In order to address
these concerns, the authors propose a trivial two-way
confirmation (LTWA) plan that makes use of the
cryptographically generated tackle algorithm in
conjunction with the confusion generated speak to
algorithm. This approach provides secure end to end
communication and stops attackers from forging
authentication messages, proving their capacity of
minimizing the risk of security in the optical networks.
In his et al, the secure access in the distributed
power networks for IoT hub equipment is discussed to
practice the security deficiency from the aspect of
restricted resources of IoT device’s. They suggest a
simple two-way authentication approach using the SM
algorithm with the help of digital signature and Diffie
Hellman protocol. This approach they find to be
effective at mitigating such network attacks as
eavesdropping and tampering and thus suitable for real
world IoT security applications.
In the IoT environment, Sharma and Babbar
analyze the Increased threat of Android malware in the
IoT environment and explore the use of ML algorithms
for detecting malware. Afterwards, their study is
compared different model and is able to conclude that
Decision Tree classifier gives the best accuracy of 95%
in detecting the malicious applications. However, the
study proposes that ML based models can be used as
security boosted method of IoT devices to fend off
malware attacks.
Further on the work of machine malware detection
with deep learning, Zhang, Zou and Zhu use DNN for
Android malware detection. In this paper, they
combine static behavioral feature extraction with
dynamic behavioral analysis in order to improve
classification accuracy. The study surpasses existing
nonparametric machine learning such as LR and SVMs
when using RNNs to detect malware patterns.
In a graph neural network (GNN) for malware
detection, Wang et al introduce his approach. In their
method, they embed call graphs of applications into a
deep neural network (DNN) to represent relationship
between calls. Traditional ML based classifier are
strongly outperformed by our model, which reaches an
accuracy of 97.7%. Results show that GNNs are
effective in detecting malicious behaviors through the
structural network analysis.
Pagan and Elleithy propose a multi layer security
approach to tackling the threat of ransomware.
Proactive defense in their framework includes
firewalls, DNS/Web filtering, email security, backups
and employee training. Traditional antivirus solutions
are shown to have shortcomings in the study which
suggest that more successful ways of avoiding
ransomware secure from the first layer of defense.
A Fuzzy Learning Network for energetic movable
Malware Detection was proposed by Martinelli, and
Santone. Given their model combines fuzzy logic and
deep neural networks, they are able to achieve high
accuracy detection of zero-day threats. As an emphasis
on the dynamic nature of the malware attacks, this
research focuses on the field of hybrid AI techniques.
Mercaldo and Santone consider image-based
malware detection with a deep-neuro-fuzzy model in
another work. They evaluate over 20,000 real world
malware samples and achieve 93.5% accuracy using
the image-based classification approach achieving a
promise of the potential of image-based classification
in cybersecurity.
The work by Rohith and Kaur gives a complete
review of malware detection and prevention
techniques, including signature-based systems and
machine learning based antivirus systems. Their
research outlines the challenges associated with
maintaining the momentum when new malware is
continuously developing, and injects input about the
need for adaptive forms of cybersecurity.
In this context, Mercaldo and Santone propose a
proper post checking method for malware relations
classification. They take to reduce redundant
comparisons and provide a maliciousness metric that
aids in increases in the efficiency of malware detection
systems.
3 METHODOLOGY
A machine learning based network traffic analysis is
proposed to implement the above malware detection
system to classify the network traffic as either benign
or malignant. The methodology involves various
arguable stages such as data gathering, data processing,
feature selection, train model, evaluate and finally
deployment. This structured approach provides an
ability for a scalable and efficient intrusion detection
system that can-do real time threat identification.
In the first step, data is collected using UNSW-
NB15 dataset as the main dataset. There are both
normal and malicious network traffic data in this
dataset. Fuzzers, Backdoors, Probabilistic Denial-of-
Service, Exploits, Reconnaissance, and Worms are
included as attack types in it, which provides an