0% found this document useful (0 votes)
18 views12 pages

Synergy Project Malware Detection

Malware Detection Project

Uploaded by

Arjun Tomar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views12 pages

Synergy Project Malware Detection

Malware Detection Project

Uploaded by

Arjun Tomar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

Synergy 2024 Project – Proposal Review

Project Title: MALWARE AND UNSAFE NETWORK DETECTION SOFTWRE

Theme: Internet of things, Block chain & Cyber Security

Tentative Budget: Rs. 9000

Name of Project PI: Name of Project Co-PI:


Faculty/Department: Faculty/Department:
Email: Email:
Contact No: Contact No: 9876168143

Name of the students Involved: 1


Project Title:

(1) Objective
To detect suspicious URL and Network connections using a machine
learning model.

(2) Problem statement


Create an application for mobile phones which can check for various indicators of
compromise in the Android phone, such as checking network communication to various IP
addresses that are suspicious, various URLs that are suspicious, inbound connections or
packets from applications that are suspicious. Use threat intelligence sources from OSINT to
decide what connections are suspicious.

2
Introduction to
Malware
•Definition: Malware, short for malicious software, refers to any software
designed to cause harm to a computer system, network, or device.
•Purpose: Malware can steal sensitive information, disrupt operations, and
damage or manipulate data.
•Types: Common types of malware include viruses, worms, Trojans, ransomware,
spyware, adware, and root
Types of Malware

Virus: A type of malware that attaches itself to


legitimate programs and spreads by infecting other files.
Trojans: Malware disguised as legitimate software, which
allows attackers to gain unauthorized access to a system.
Adware: Software that displays unwanted
advertisements to users, often bundled with legitimate
programs.
Characteristics of Malicious
Applications
1.Data Theft: Malicious apps may steal sensitive
information such as passwords, financial data, or
personal information.
2.System damage: Some malware is designed to corrupt
or delete files, leading to system instability or data loss.
3.Unauthorized Access: Malware can provide attackers
with remote access to a system, allowing them to
execute commands or install additional malware.
4.Disruption: Malware may disrupt system operations,
leading to downtime or loss of productivity.
Methods of Malware Identification
1.Antivirus Software: Utilizes signature-based detection,
heuristic analysis, and behavior-based detection to
identify and remove malware.
2.Behavior Analysis: Examines the behavior of applications
to detect suspicious activities indicative of malware.
• User Awareness Training: Educates users about the risks of
malware and best practices for preventing infections.
• Network Traffic Analysis: Analyzes network communication
patterns for indicators of compromise associated with
malware.
Conclusion

• Understanding malware and its identification methods is


essential for protecting against cyber threats.
• Understanding unsafe networks and process of their
identification.
• By staying informed and implementing proactive
security measures, individuals and organizations can
mitigate the risks posed by malicious applications.
Project Title:

(3) Schematic/Block diagram/Flow-chart

8
Project Title:

(4) Expected result/Outcome

 Our software will be able to dectect any risk of malware in a


given URL or an unsafe network connection.
 We shall further develop an app for this software to facilitate
mobile phone users.

9
How our Project in Different ?

• Use of machine learning model to increase the efficiency of the


software.
• Use of threat intelligence sources from OSINT to decide what
connections are suspicious.
• Creation of a user friendly application to facilitate the android users of
our software.
Project Title:

(5) Proposed budget with a breakup

SL Items Amount( Rs.) Justification


No.
1 Consumables Development Software 1000 For creating and hosting website and
mobile application for our software
Domain 1000

Server 2000

2 Non-Consumables Accessories 2000 For security and other needs for our
project
Security 1000

3 Others Maintenance 2000 For the continuous maintenance and


checks on our software

Total Amount 9000

11
Project Title:

(6) Timeline

Sl. Objective Timeline (Weeks)


No.
0-1 1-2 2-3 3-4

1
2
3

12

You might also like