SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1824
Securing computers from Remote Access Trojans using Deep Learning
Approach
BHUVANESHWARAN S1, HARSHAVARDHAN R2, KEERAGATTI NIRMAL SRINEEVAS 3
V LOGESH KUMAR4
1,2,3,4UG scholar, Department of Computer Science Engineering, Kingston Engineering College, Tamilnadu, India.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Aggressors(attackers) generally utilize Remote
Access Trojans (RATs) to managea PC,whichmakestheRAT
discovery as a functioning exploration field. The primary
specialist, the host operator, which is in charge of observing
the framework analyse the running host and notify the
Network analyzer. The subsequent operator, the system
specialist(Network Analyzer), screens the system traffic to
look out any RAT examples. This project presents an AI
based system which uses deep learning. The proposed
system structure comprises of two operators that are
coordinated to accomplish discovery of the RAT-bots by
utilizing Artificial Neural Network. The presentation of the
presented structure is assessed by ongoing database. The
exploratory outcomes show that the proposedapproachcan
accomplish an high accuracy rate with less false positive
rate. The incorporated methodology improves both the
identification proportion and precision
Key Words:RAT bots,botnets,ANNAlgorithm,Deeplearning
algorithms
1. INTRODUCTION
Assailants usually use Remote Access Trojans
(RATs) to need a full management on others computer, that
produces the RAT discovery as a significant operation. This
project presents Associate in AI based system for distinctive
listed off hosts and systems that unit tainted by the RAT-
Bots. The projected structure includes of twospecialiststhat
unit coordinated to accomplish dependable early
identification of the RAT-bots. The Host Analyzer, observes
the running host Associate in raising an alert for any
irregularities. The following operator, the system
specialist(Network Analyzer), screens the systemtrafficand
ANN algorithm is implemented in Network Analyzer. The
incorporated methodology improves each the identification
proportion. Any case, every approach cannot severally
accomplish a similar presentation because the projected
RAT-Bots identification structure. The exhibition of the
conferred system is assessed by utilizing real benchmark
datasets.
Intruders use social engineeringwayslikeDrive-by-
download to transfer RAT during this context, the gained
root privileges at the setup method unit pre- served by RAT
server for launching the required attacks and disabling any
functions intimidate its practicality. Artificial Neural
Network is that's impressed by the way biological nervous
systems, just like the brain, method information. In easier
terms it is a straightforward mathematical model of the
brain that's employed to method nonlinear relationships
between inputs and outputs in parallel style of a person's
brain.
By this ANN algorithmic program we tend to
observe the host and network to go looking out whether or
not any System is infected with RATs.
1.1 Existing System:
The Existing system uses Random Forest algorithm
to detect RAT bots. Remote access Trojans (RATs) are used
by attackers to compromise and control the victim machine.
In this system it is hard to prevent the intrusion of RATs
completely and confidential information can be leaked to
attacker. The Network Agent checks the suspicious host and
notifies whether it is affected host or not. This system has
very high false positive rate.
Disadvantages:
• The time complexity is high to evaluate the
proposed framework as it uses Random Forest
algorithm.
• It is hard to prevent the intrusion of RATs
completely, preventing confidential information
being leaked back to the attacker is the main issue.
• The other is to remain a high accuracytodetectRAT
sessions, while there exist normal applications
whose traffic behave similarly to RATs
1.2 Proposed System:
We propose a system which uses deep learning
algorithm Artificial Neural Network(ANN) to detectRATbot
with high accuracy rate. Aggressors(attackers) generally
utilize Remote Access Trojans (RATs) to managea PC,which
makes the RAT discovery as a functioning exploration field.
The primary specialist, the host operator, which is in charge
of observing the framework analyse the running host and
notify the Network analyzer. The subsequent operator, the
system specialist(Network Analyzer), screens the system
traffic to look out any RAT examples. This project presents
an AI based system which uses deep learning. The proposed
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1825
system structure comprises of two operators that are
coordinated to accomplish discovery of the RAT-bots by
utilizing Artificial Neural Network. The presentation of the
presented structure is assessed by ongoing database. The
exploratory outcomes show that the proposedapproachcan
accomplish an high accuracy rate with less false positive
rate. The incorporated methodology improves both the
identification proportion and precision.
ADVANTAGES:
• After ANN training, the data may produce output
even with incomplete information.
• Artificial neural networks learn events and make
decisions by commenting on similar events.
• Artificial neural networks have numerical strength
that can perform more than one job at the same
time.
• ANN algorithm increases robustness of the
proposed approach
Fig -1: Architecture Diagram of proposed system
FIG-2 Flow Chart Diagram
2. MODULES
2.1 List of modules
 Pre-process
 Host Analyzer
 Network Analyzer
 Feature Extraction Phase
 Feature Selection Phase
 Training /detection phase
 Testing Phase
Proposed Algorithm:
Artificial Neural Networks(ANN) relies on a collection of
connected units or nodes called artificial neurons, which
loosely model the neurons in biological
brain. Every affiliation, like the synapses in a very biological
brain, can transmit an indication to alternative. Artificial
Neural Networks (ANN) unit of measurement multi-layer
fully-connected neural nets thatappearasifthefigurebelow.
They include a associate input layer, multiple hidden layers,
associated an output layer. Each node in one layer is
connected to every alternative node within the subsequent
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1826
layer. We tend to make the network deeper byincreasingthe
amount of hidden layers.
Step1: A input for the given node taken because the
weighted add of its inputs, and passes it through a non-
linear activation perform. This can be often the output of
the node, that's passed as input of another node within
the subsequent layer.
Step 2:. The signal flows from left to right, and also the
ultimateoutput is calculatedby playactingthisprocedure
for all the nodes. Coaching this deep neural network
suggests that learning the weights associated with all the
edges.
Step 3: Take a samples of data file and pass them through
the network to urge their prediction.
Step 4: Compare these predictions obtained with the
values of expected labels and calculate the loss with
them. The equation for a given node appearance as
follows. Wherever n is the range of inputs for the node.
Step 5: Perform the back propagation so on propagate
this loss to each one amongsttheparametersthatconjure
the model of the neural network. Use thispropagatedinfo
to update the parameters of the neural network with the
gradient descent in a very manner that the complete loss
is reduced and a stronger model is obtained.
Fig-2: ANN Structure
DATA SETS:
As a summary, ANNs are very flexible yet powerful
deep learning models. There has been an incredible surge on
their popularity recently due to which made training these
models possible, huge increase in computational power.
After creating several neural network layerstoread
each content of RAT file by combiningofmanydata thathave
been given before these data sets have been saved as .csv
format. Using this we train our algorithm to detect the RAT
files
3. CONCLUSION
This provides a system to detect a RAT bots. There
are two phases. First phase detects the suspiciousbehaviour
of the host. The Second phase captures the network logs of
the suspicious host and mapping its network behaviour for
classification purposes. Deep learning algorithm Artificial
Neural Network is used to detect whether the file is RAT.
This provides accuracy of greater than 99.3%.. Future work
will include reducing the false positive rate and number of
RAT samples to be increased order to further improve the
accuracy and reduce the FNR of the predictions.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1827
REFERENCES
1. A Network Behaviour Analysis Method to Detect
ReverseRemoteAccess Trojan,2018
2. G. Gu, R. Perdisci, J. Zhang, and W. Lee, ‘‘Clustering
analysis of network traffic for protocol- and
structure-independent botnet detection,
Proc.17thConf.SecuritySymp. Berkeley, CA,USA,
vol.8, 2008, pp. A network-based framework for
RAT-bots detection,2017
3. RAT-based Malicious Activities Detection on
Enterprise Internal Networks, 2015
4. An Approach to Detect Remote Access Trojan in the
Early stage of Communication,2015
5. Y. Liang, G. Peng, H. Zhang, and . Wang, n
Unknown Trojan etection Method ased on
oftware Network ehaviour , Wuhan University
Journal of Natural Sciences, Vol.18, No. 5, pp.369-
376, Mar.2013.
6. A. Karim, R. Salleh, M. K. Khan, A. Siddiqa, and K.-K.
R.
Choo, ‘‘On the Analysis and Detection of Mobile
otnet pplications,’’J. Universal Comput. ci., vol.
22, no. 4, pp. 567–588, 2016.
7. K. imon, C. Moucha, and J. Keller, ‘‘Contactless
vulnerability
analysis using Google and shodan,’’ J. Universal
Comput. Sci., vol.23,no.4,pp.404–430,2017.
8. A. Karim, R. B. Salleh, M. Shiraz, S. A. A. Shah, I.
wan, andN. . nuar,‘‘ otnetdetectiontechniques:
Review, future trends, andissues,’’J. Zhejiang Univ.
Sci. C, vol. 15, no. 11, pp. 943–983, Nov. 2014.
9. A. R. Rodrìg uez-Gómez, G. Maciá -Fernández, and P.
García -Teodoro, ‘‘ urvey and taxonomy of botnet
research through life-cycle,’’ CM Comput. urv.,
vol. 45, no. 4, Aug. 2013, Art.

More Related Content

What's hot

Dp31547550
Dp31547550Dp31547550
Dp31547550
IJMER
 

What's hot (20)

Internet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining TechniquesInternet Worm Classification and Detection using Data Mining Techniques
Internet Worm Classification and Detection using Data Mining Techniques
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
 
An approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithmAn approach for ids by combining svm and ant colony algorithm
An approach for ids by combining svm and ant colony algorithm
 
Icacci presentation-cnn intrusion
Icacci presentation-cnn intrusionIcacci presentation-cnn intrusion
Icacci presentation-cnn intrusion
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network Security
 
Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...Application of machine learning and cognitive computing in intrusion detectio...
Application of machine learning and cognitive computing in intrusion detectio...
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
Dp31547550
Dp31547550Dp31547550
Dp31547550
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
 
50120140506001
5012014050600150120140506001
50120140506001
 
Bi33349355
Bi33349355Bi33349355
Bi33349355
 
Wireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approachWireless lan intrusion detection by using statistical timing approach
Wireless lan intrusion detection by using statistical timing approach
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1DB-OLS: An Approach for IDS1
DB-OLS: An Approach for IDS1
 
Yolinda chiramba Survey Paper
Yolinda chiramba Survey PaperYolinda chiramba Survey Paper
Yolinda chiramba Survey Paper
 
Evaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chainEvaluation of network intrusion detection using markov chain
Evaluation of network intrusion detection using markov chain
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
06558266
0655826606558266
06558266
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 

Similar to IRJET - Securing Computers from Remote Access Trojans using Deep Learning Approach

Similar to IRJET - Securing Computers from Remote Access Trojans using Deep Learning Approach (20)

Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
IRJET - Military Spy Robot with Intelligentdestruction
IRJET - Military Spy Robot with IntelligentdestructionIRJET - Military Spy Robot with Intelligentdestruction
IRJET - Military Spy Robot with Intelligentdestruction
 
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
IRJET-An Efficient Model for Detecting and Identifying Cyber Attacks in Wirel...
 
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
IRJET- Identification of Scene Images using Convolutional Neural Networks - A...
 
IRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using YoloIRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using Yolo
 
Neural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile RobotNeural Network Implementation Control Mobile Robot
Neural Network Implementation Control Mobile Robot
 
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
 
IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...
IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...
IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...
 
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOTPSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
PSO-GSA Tuned Dynamic Allocation in Wireless Video Sensor Networks for IOT
 
IRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-SurveyIRJET- Genetic Algorithm based Intrusion Detection-Survey
IRJET- Genetic Algorithm based Intrusion Detection-Survey
 
Text Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A ReviewText Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A Review
 
IRJET- Power Theft Detection using Probabilistic Neural Network Classifier
IRJET- Power Theft Detection using Probabilistic Neural Network ClassifierIRJET- Power Theft Detection using Probabilistic Neural Network Classifier
IRJET- Power Theft Detection using Probabilistic Neural Network Classifier
 
Soft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusionSoft computing and artificial intelligence techniques for intrusion
Soft computing and artificial intelligence techniques for intrusion
 
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
IRJET-Structure less Efficient Data Aggregation and Data Integrity in Sensor ...
 
Intelligent Accident Detection, Prevention and Reporting System
Intelligent Accident Detection, Prevention and Reporting SystemIntelligent Accident Detection, Prevention and Reporting System
Intelligent Accident Detection, Prevention and Reporting System
 
IRJET- Ad-hoc Based Outdoor Positioning System
IRJET- Ad-hoc Based Outdoor Positioning SystemIRJET- Ad-hoc Based Outdoor Positioning System
IRJET- Ad-hoc Based Outdoor Positioning System
 
BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEW
BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEWBOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEW
BOTNET DETECTION USING VARIOUS MACHINE LEARNING ALGORITHMS: A REVIEW
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Recently uploaded (20)

Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 

IRJET - Securing Computers from Remote Access Trojans using Deep Learning Approach

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1824 Securing computers from Remote Access Trojans using Deep Learning Approach BHUVANESHWARAN S1, HARSHAVARDHAN R2, KEERAGATTI NIRMAL SRINEEVAS 3 V LOGESH KUMAR4 1,2,3,4UG scholar, Department of Computer Science Engineering, Kingston Engineering College, Tamilnadu, India. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Aggressors(attackers) generally utilize Remote Access Trojans (RATs) to managea PC,whichmakestheRAT discovery as a functioning exploration field. The primary specialist, the host operator, which is in charge of observing the framework analyse the running host and notify the Network analyzer. The subsequent operator, the system specialist(Network Analyzer), screens the system traffic to look out any RAT examples. This project presents an AI based system which uses deep learning. The proposed system structure comprises of two operators that are coordinated to accomplish discovery of the RAT-bots by utilizing Artificial Neural Network. The presentation of the presented structure is assessed by ongoing database. The exploratory outcomes show that the proposedapproachcan accomplish an high accuracy rate with less false positive rate. The incorporated methodology improves both the identification proportion and precision Key Words:RAT bots,botnets,ANNAlgorithm,Deeplearning algorithms 1. INTRODUCTION Assailants usually use Remote Access Trojans (RATs) to need a full management on others computer, that produces the RAT discovery as a significant operation. This project presents Associate in AI based system for distinctive listed off hosts and systems that unit tainted by the RAT- Bots. The projected structure includes of twospecialiststhat unit coordinated to accomplish dependable early identification of the RAT-bots. The Host Analyzer, observes the running host Associate in raising an alert for any irregularities. The following operator, the system specialist(Network Analyzer), screens the systemtrafficand ANN algorithm is implemented in Network Analyzer. The incorporated methodology improves each the identification proportion. Any case, every approach cannot severally accomplish a similar presentation because the projected RAT-Bots identification structure. The exhibition of the conferred system is assessed by utilizing real benchmark datasets. Intruders use social engineeringwayslikeDrive-by- download to transfer RAT during this context, the gained root privileges at the setup method unit pre- served by RAT server for launching the required attacks and disabling any functions intimidate its practicality. Artificial Neural Network is that's impressed by the way biological nervous systems, just like the brain, method information. In easier terms it is a straightforward mathematical model of the brain that's employed to method nonlinear relationships between inputs and outputs in parallel style of a person's brain. By this ANN algorithmic program we tend to observe the host and network to go looking out whether or not any System is infected with RATs. 1.1 Existing System: The Existing system uses Random Forest algorithm to detect RAT bots. Remote access Trojans (RATs) are used by attackers to compromise and control the victim machine. In this system it is hard to prevent the intrusion of RATs completely and confidential information can be leaked to attacker. The Network Agent checks the suspicious host and notifies whether it is affected host or not. This system has very high false positive rate. Disadvantages: • The time complexity is high to evaluate the proposed framework as it uses Random Forest algorithm. • It is hard to prevent the intrusion of RATs completely, preventing confidential information being leaked back to the attacker is the main issue. • The other is to remain a high accuracytodetectRAT sessions, while there exist normal applications whose traffic behave similarly to RATs 1.2 Proposed System: We propose a system which uses deep learning algorithm Artificial Neural Network(ANN) to detectRATbot with high accuracy rate. Aggressors(attackers) generally utilize Remote Access Trojans (RATs) to managea PC,which makes the RAT discovery as a functioning exploration field. The primary specialist, the host operator, which is in charge of observing the framework analyse the running host and notify the Network analyzer. The subsequent operator, the system specialist(Network Analyzer), screens the system traffic to look out any RAT examples. This project presents an AI based system which uses deep learning. The proposed
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1825 system structure comprises of two operators that are coordinated to accomplish discovery of the RAT-bots by utilizing Artificial Neural Network. The presentation of the presented structure is assessed by ongoing database. The exploratory outcomes show that the proposedapproachcan accomplish an high accuracy rate with less false positive rate. The incorporated methodology improves both the identification proportion and precision. ADVANTAGES: • After ANN training, the data may produce output even with incomplete information. • Artificial neural networks learn events and make decisions by commenting on similar events. • Artificial neural networks have numerical strength that can perform more than one job at the same time. • ANN algorithm increases robustness of the proposed approach Fig -1: Architecture Diagram of proposed system FIG-2 Flow Chart Diagram 2. MODULES 2.1 List of modules  Pre-process  Host Analyzer  Network Analyzer  Feature Extraction Phase  Feature Selection Phase  Training /detection phase  Testing Phase Proposed Algorithm: Artificial Neural Networks(ANN) relies on a collection of connected units or nodes called artificial neurons, which loosely model the neurons in biological brain. Every affiliation, like the synapses in a very biological brain, can transmit an indication to alternative. Artificial Neural Networks (ANN) unit of measurement multi-layer fully-connected neural nets thatappearasifthefigurebelow. They include a associate input layer, multiple hidden layers, associated an output layer. Each node in one layer is connected to every alternative node within the subsequent
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1826 layer. We tend to make the network deeper byincreasingthe amount of hidden layers. Step1: A input for the given node taken because the weighted add of its inputs, and passes it through a non- linear activation perform. This can be often the output of the node, that's passed as input of another node within the subsequent layer. Step 2:. The signal flows from left to right, and also the ultimateoutput is calculatedby playactingthisprocedure for all the nodes. Coaching this deep neural network suggests that learning the weights associated with all the edges. Step 3: Take a samples of data file and pass them through the network to urge their prediction. Step 4: Compare these predictions obtained with the values of expected labels and calculate the loss with them. The equation for a given node appearance as follows. Wherever n is the range of inputs for the node. Step 5: Perform the back propagation so on propagate this loss to each one amongsttheparametersthatconjure the model of the neural network. Use thispropagatedinfo to update the parameters of the neural network with the gradient descent in a very manner that the complete loss is reduced and a stronger model is obtained. Fig-2: ANN Structure DATA SETS: As a summary, ANNs are very flexible yet powerful deep learning models. There has been an incredible surge on their popularity recently due to which made training these models possible, huge increase in computational power. After creating several neural network layerstoread each content of RAT file by combiningofmanydata thathave been given before these data sets have been saved as .csv format. Using this we train our algorithm to detect the RAT files 3. CONCLUSION This provides a system to detect a RAT bots. There are two phases. First phase detects the suspiciousbehaviour of the host. The Second phase captures the network logs of the suspicious host and mapping its network behaviour for classification purposes. Deep learning algorithm Artificial Neural Network is used to detect whether the file is RAT. This provides accuracy of greater than 99.3%.. Future work will include reducing the false positive rate and number of RAT samples to be increased order to further improve the accuracy and reduce the FNR of the predictions.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1827 REFERENCES 1. A Network Behaviour Analysis Method to Detect ReverseRemoteAccess Trojan,2018 2. G. Gu, R. Perdisci, J. Zhang, and W. Lee, ‘‘Clustering analysis of network traffic for protocol- and structure-independent botnet detection, Proc.17thConf.SecuritySymp. Berkeley, CA,USA, vol.8, 2008, pp. A network-based framework for RAT-bots detection,2017 3. RAT-based Malicious Activities Detection on Enterprise Internal Networks, 2015 4. An Approach to Detect Remote Access Trojan in the Early stage of Communication,2015 5. Y. Liang, G. Peng, H. Zhang, and . Wang, n Unknown Trojan etection Method ased on oftware Network ehaviour , Wuhan University Journal of Natural Sciences, Vol.18, No. 5, pp.369- 376, Mar.2013. 6. A. Karim, R. Salleh, M. K. Khan, A. Siddiqa, and K.-K. R. Choo, ‘‘On the Analysis and Detection of Mobile otnet pplications,’’J. Universal Comput. ci., vol. 22, no. 4, pp. 567–588, 2016. 7. K. imon, C. Moucha, and J. Keller, ‘‘Contactless vulnerability analysis using Google and shodan,’’ J. Universal Comput. Sci., vol.23,no.4,pp.404–430,2017. 8. A. Karim, R. B. Salleh, M. Shiraz, S. A. A. Shah, I. wan, andN. . nuar,‘‘ otnetdetectiontechniques: Review, future trends, andissues,’’J. Zhejiang Univ. Sci. C, vol. 15, no. 11, pp. 943–983, Nov. 2014. 9. A. R. Rodrìg uez-Gómez, G. Maciá -Fernández, and P. García -Teodoro, ‘‘ urvey and taxonomy of botnet research through life-cycle,’’ CM Comput. urv., vol. 45, no. 4, Aug. 2013, Art.