p-Index From 2020 - 2025
5.329
P-Index
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : JOIV : International Journal on Informatics Visualization

The Rise of Deep Learning in Cyber Security: Bibliometric Analysis of Deep Learning and Malware Kamarudin, Nur Khairani; Firdaus, Ahmad; Osman, Mohd Zamri; Alanda, Alde; Erianda, Aldo; Kasim, Shahreen; Ab Razak, Mohd Faizal
JOIV : International Journal on Informatics Visualization Vol 8, No 3 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.3.1535

Abstract

Deep learning is a machine learning technology that allows computational models to learn via experience, mimicking human cognitive processes. This method is critical in the development of identifying certain objects, and provides the computational intelligence required to identify multiple objects and distinguish it between object A or Object B. On the other hand, malware is defined as malicious software that seeks to harm or disrupt computers and systems. Its main categories include viruses, worms, Trojan horses, spyware, adware, and ransomware. Hence, many deep learning researchers apply deep learning in their malware studies. However, few articles still investigate deep learning and malware in a bibliometric approach (productivity, research area, institutions, authors, impact journals, and keyword analysis). Hence, this paper reports bibliometric analysis used to discover current and future trends and gain new insights into the relationship between deep learning and malware. This paper’s discoveries include: Deployment of deep learning to detect domain generation algorithm (DGA) attacks; Deployment of deep learning to detect malware in Internet of Things (IoT); The rise of adversarial learning and adversarial attack using deep learning; The emergence of Android malware in deep learning; The deployment of transfer learning in malware research; and active authors on deep learning and malware research, including Soman KP, Vinayakumar R, and Zhang Y.
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey Kadhum, Laith M; Firdaus, Ahmad; Hisham, Syifak Izhar; Mushtaq, Waheed; Ab Razak, Mohd Faizal
JOIV : International Journal on Informatics Visualization Vol 8, No 2 (2024)
Publisher : Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/joiv.8.2.2725

Abstract

Various types of malwares are capable of bringing harm to users. The list of types are root exploits, botnets, trojans, spyware, worms, viruses, ransomware, and cryptojacking. Cryptojacking is a significant proportion of cyberattacks in which exploiters mine cryptocurrencies using the victim’s devices, for instance, smartphones, tablets, servers, or computers. It is also defined as the illegal utilization of victim resources (CPU, RAM, and GPU) to mine cryptocurrencies without detection. The purpose of cryptojacking, along with numerous other forms of cybercrime, is monetary gain. Furthermore, it also intended to stay concealed from the victim's viewpoint. Following this crime, to the author's knowledge, a paper focusing solely on a review of cryptojacking research is still unavailable. This paper presents cryptojacking detection information to address this deficiency, including methods, detection, analysis techniques, and features. As cryptojacking malware is a type that executes its activities using the network, most of the analysis and features fall into dynamic activities. However, static analysis is also included in the security researcher’s option. The codes that are involved are opcode and JavaScript. This demonstrates that these two languages are vital programming languages to focus on to detect cryptojacking. Moreover, the researchers also begin to adopt deep learning in their experiments to detect cryptojacking malware. This paper also examines potential future developments in the detection of cryptojacking.
Co-Authors Ab Razak, Mohd Faizal Abdul Wahab Adi Siswanto Afrianto, Dadang Alde Alanda, Alde Aldo Erianda, Aldo Amalia, Firqo amperawati, metty Azhary, Muhammad Royyan Faqih Azizi, Muhammad Azmidar Azmidar, Azmidar bin Asis, Joharis Buhaerah Buhaerah, Buhaerah Busrah, Zulfiqar Cindy Desiana Darmawan, Dhany Isnaeni Deni Sunaryo, Deni Dwiputri, Adelita Vega Eko Budi Satoto Endang Fatmawati Era Catur Prasetya Faiz, Muhammad Fauzi, Fahrian Al Hairul Anwar, Hairul Hartoni ., Hartoni Hasbillah, Ahmad Ubaydi Hilma, Hidayatul Maslakha Hisham, Syifak Izhar Idris, Ahmad Indarwati Indarwati Irkadiratna, Aderisti Irwan Abdullah Jati, prihatina Jusdienar, Akka Latifah Kadhum, Laith M Kahar Kamarudin, Nur Khairani Lailiyah, Sufil Lien Maulina Lilik Andaryuni Lina - Mariana, Lina - Lukman Hakim M.Pd, Drs. Hermanzoni, M.Pd, Prof.Dr. Alnedral, Mabruroh, Mabruroh Maryono, Iyon Melki Melki Milisani, Meirna Muhammad Agus Muljanto Muhammad Asir Muhammad Muslih munifa, Munifa Mushtaq, Waheed Narulitia, Adinda Nisa, Sifa Khoridatun Nugraha, Adi Satria Nur Sandi Marsuni Odien Rosidin Oktayudra, Farhan Osman, Mohd Zamri Paray Theo Lonando Pratikno, Yuni Rachman, Siswati Ratnawita Ratnawita Resti Resti Riris Aryawati Rosid Bahar S.Pd. M.Pd, Sari Mariati, Saeful Anwar, Saeful Secka, Absa Setyobudi Setyobudi Shahreen Kasim, Shahreen Shofia Zahra Agustina Siti Choiriyah Siti Utami Dewi Ningrum Solehudin, Solehudin Sri Nuryati Sri Wahyuningsih Suprapto Suprapto Walid, Miftahul Wicaksana, Gilang Adi Yoga Adiyanto, Yoga Yuliani, Nur Fadny Yuyu Yuhana