Loading

Malicious Traffic Detection System using Publicly Available Blacklist’s
Sudarshan N1, P.Dass2
1Sudarshan N, Bachelor’s Student, Department of Electronics and Communication Engineering, Saveetha School of Engineering, Chennai (Tamil Nadu), India.
2P.Dass, Assistant Professor, Department of Electronics and Communication Engineering, Saveetha School of Engineering, Chennai (Tamil Nadu), India.
Manuscript received on 16 August 2019 | Revised Manuscript received on 28 August 2019 | Manuscript Published on 06 September 2019 | PP: 356-361 | Volume-8 Issue- 6S, August 2019 | Retrieval Number: F10750886S19/19©BEIESP | DOI: 10.35940/ijeat.F1075.0886S19
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this fastest growing technology with the increase in internet usage, the communication became much faster and easier which resulted in the massive growth in digitalization. With this the cyber crimes were increasing day-by-day . They employ every possible technique and trick to make the users as zombies for their malicious activities or Crypto mining. In recent years we are facing issues with ransomware’ which result in the loss of data integrity and confidentiality along with our privacy and anonymity. The malware’ can spread all over the network within no time. Using anti virus programs alone for safeguarding our network is a bad practice because they filter the traffic on signature based. Here problem is if the user is not up to date with the definitions from the AV provider, then he will be prone to the attack. In this model a system to track malicious trails in a network is done. This employs online malware detection system (Virus Total) and open source dynamic black lists which contain malware or suspicious programs along with some static pre compiled blacklists from different antivirus providers and our own definitions of block to filter the traffic which gives the detailed log report on the suspicious trails, this is from domain name or IP address or malicious scripts in the webpage.
Keywords: Cyber Crimes, Malware, Virustotal, Black Lists, Filtering, Log Report.
Scope of the Article: Adaptive Systems