Anatomy of targeted attacks with smart malware

被引:5
|
作者
Bahtiyar, Serif [1 ]
机构
[1] Bogazici Univ, Dept Comp Engn, TR-34342 Istanbul, Turkey
关键词
smart malware; security; targeted attack; INFORMATION SECURITY; CYBER SECURITY; BEHAVIOR; NETWORKS; STUXNET; VIRUS;
D O I
10.1002/sec.1767
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The expansive connectivity of information systems has set the stage for pervasive malware to leverage multiple attack vectors and propagation methods. In doing so, this malware has taken on the complexity and richness of the very society it endeavors to control. Defending against it is therefore exceptionally difficult because defense systems have no autonomy in perceiving threats of complex malware and reacting against it. In this paper, smart malware model is defined as emerging complex malware that may be used by defense systems to perceive complex malware and reacting to its attacks. A targeted attack is also presented to show the difficulty of defending systems against smart malware. It is also compared with conventional malware to analyze malware types. Moreover, a numerical study about smart malware is presented to evaluate the proposed model in a more precise manner. The comparison and the numerical study show that our model can be used to perceive smart malware autonomously by automated tools. Copyright (C) 2017 John Wiley & Sons, Ltd.
引用
收藏
页码:6215 / 6226
页数:12
相关论文
共 50 条
  • [1] Stronger Targeted Poisoning Attacks Against Malware Detection
    Narisada, Shintaro
    Sasaki, Shoichiro
    Hidano, Seira
    Uchibayashi, Toshihiro
    Suganuma, Takuo
    Hiji, Masahiro
    Kiyomoto, Shinsaku
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2020, 2020, 12579 : 65 - 84
  • [2] Cybersecurity for autonomous vehicles against malware attacks in smart-cities
    Aurangzeb, Sana
    Aleem, Muhammad
    Khan, Muhammad Taimoor
    Anwar, Haris
    Siddique, Muhammad Shaoor
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 3363 - 3378
  • [3] SMART VEHICLE SECURITY SYSTEM FOR DEFENDING AGAINST COLLABRATIVE ATTACKS BY MALWARE
    Ramaiah, Chandra Shekar
    Hussain, S. Asif
    Hussain, S. Zahid
    Al Balushi, Yahya
    2016 3RD MEC INTERNATIONAL CONFERENCE ON BIG DATA AND SMART CITY (ICBDSC), 2016, : 289 - 293
  • [4] Anatomy of malware
    Anatomia del malware
    1600, Associazione Italiana per l'Informatica e il Calcolo Automat, Piazzale Rodolfo Morandi, 2, Milano, 20121, Italy (12):
  • [5] Anatomy of a malware attack
    Netw. Secur., 1 (4-7):
  • [6] Availability Attacks on Computing Systems through Alteration of Environmental Control: Smart Malware Approach
    Chung, Keywhan
    Kalbarczyk, Zbigniew T.
    Iyer, Ravishankar K.
    ICCPS '19: PROCEEDINGS OF THE 2019 10TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS, 2019, : 1 - 12
  • [7] StuxMob: A Situational-Aware Malware for Targeted Attack on Smart Mobile Devices
    Hasan, Ragib
    Zawoad, Shams
    Haque, Md Munirul
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 509 - 514
  • [8] RFID malware fragmentation attacks
    Suliman, A.
    Shankarapani, M. K.
    Mukkamala, S.
    Sung, A. H.
    PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON COLLABORATIVE TECHNOLOGIES AND SYSTEMS: CTS 2008, 2008, : 533 - 539
  • [9] Cyber Attacks via Consumer Electronics: Studying the Threat of Covert Malware in Smart and Autonomous Vehicles
    Haghighi, Mohammad Sayad
    Farivar, Faezeh
    Jolfaei, Alireza
    Asl, Azin Bayrami
    Zhou, Wei
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2023, 69 (04) : 825 - 832
  • [10] Anatomy on Malware Distribution Networks
    Kim, Sungjin
    IEEE ACCESS, 2020, 8 (08): : 73919 - 73930