About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Proceedings of the 4th International Conference on Information Technology, Civil Innovation, Science, and Management, ICITSM 2025, 28-29 April 2025, Tiruchengode, Tamil Nadu, India, Part II

Research Article

Advanced Security Scanner for Malware Detection and USB Monitoring with Gmail Integration

Download9 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/eai.28-4-2025.2358069,
        author={Jaswanth Pardha Saradhi  Kayala and Gogada Jyothi Subrahmanyam  Sai and Bollineni Bhuvanesh  Chowdary and Sanaka  Veerababu and M.  Nirupama Bhat},
        title={Advanced Security Scanner for Malware Detection and USB Monitoring with Gmail Integration},
        proceedings={Proceedings of the 4th International Conference on Information Technology, Civil Innovation, Science, and Management, ICITSM 2025, 28-29 April 2025, Tiruchengode, Tamil Nadu, India, Part II},
        publisher={EAI},
        proceedings_a={ICITSM PART II},
        year={2025},
        month={10},
        keywords={malware detection virustotal api yara rules usb monitoring file scanning gmail api hash calculation gmail attachment scanning security scanner api integration scan folder scan gmail scanning report real-time scanning threat detection},
        doi={10.4108/eai.28-4-2025.2358069}
    }
    
  • Jaswanth Pardha Saradhi Kayala
    Gogada Jyothi Subrahmanyam Sai
    Bollineni Bhuvanesh Chowdary
    Sanaka Veerababu
    M. Nirupama Bhat
    Year: 2025
    Advanced Security Scanner for Malware Detection and USB Monitoring with Gmail Integration
    ICITSM PART II
    EAI
    DOI: 10.4108/eai.28-4-2025.2358069
Jaswanth Pardha Saradhi Kayala1, Gogada Jyothi Subrahmanyam Sai1, Bollineni Bhuvanesh Chowdary1,*, Sanaka Veerababu1, M. Nirupama Bhat1
  • 1: Vignan’s. Foundation for Science, Technology & Research (Deemed to be University)
*Contact email: bhuvaneshchowdary09@gmail.com

Abstract

The aim of the project is to develop a comprehensive malware detection system that enforces a combination of detection mechanisms to provide resilient and scalable defence against a wide-range of cyber threats. The system uses the Virus Total API to detect known malware, accessed through a large collection of signatures provided by various anti-virus engines. In addition to the signature-based detection, the system relies on YARA rule-based identification, which recognises malware by its particular patterns and file characteristics, making its degree of security even higher. With machine learning (ML) in place, the system can identify hitherto unknown malware by analyzing data patterns, like file metadata and system behaviors. In addition, with the inclusion of deep learning methodologies, namely Convolutional Neural Networks (CNNs) we automatically learn complex data features and patterns, contributing towards enhanced detection of state-of-the-art and evasive malware. The graphical malware scanner can also perform on-the-fly scanning of files as they are accessed, and if discrepancies are found – regardless of how the files are accessed such as through a file metilnk or ifa USB/DVD content is inserted to a compromised computer that has autorun enabled – it will block malware located in.exe files as a result of this on-access scan. The service also scans email attachments with the Gmail API, preventing malware from being delivered through email.

Keywords
malware detection, virustotal api, yara rules, usb monitoring, file scanning, gmail api, hash, calculation, gmail attachment scanning, security scanner, api integration, scan folder, scan gmail, scanning report, real-time scanning, threat detection
Published
2025-10-14
Publisher
EAI
http://dx.doi.org/10.4108/eai.28-4-2025.2358069
Copyright © 2025–2025 EAI
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL