A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments

被引:3
|
作者
Choi, Seul-Ki [1 ]
Lee, Taejin [2 ]
Kwak, Jin [3 ]
机构
[1] Ajou Univ, Dept Comp Engn, ISAA Lab, Suwon, South Korea
[2] Hoseo Univ, Dept Comp Engn, Asan, South Korea
[3] Ajou Univ, Dept Cyber Secur, Suwon, South Korea
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2019年 / 13卷 / 03期
基金
新加坡国家研究基金会;
关键词
Cyber security; Malicious code; Malware; Security threat;
D O I
10.3837/tiis.2019.03.028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of new technologies and devices brings a new environment in the field of cyber security. It is not easy to predict possible security threats about new environment every time without special criteria. In other words, most malicious codes often reuse malicious code that has occurred in the past, such as bypassing detection from anti-virus or including additional functions. Therefore, we are predicting the security threats that can arise in a new environment based on the history of repeated malicious code. In this paper, we classify and define not only the internal information obtained from malicious code analysis but also the features that occur during infection and attack. We propose a method to predict and manage security threats in new environment by continuously managing and extending.
引用
收藏
页码:1611 / 1625
页数:15
相关论文
共 50 条
  • [1] Security analysis of the palm operating system and its weaknesses against malicious code threats
    Kingpin
    Mudge
    USENIX ASSOCIATION PROCEEDINGS OF THE 10TH USENIX SECURITY SYMPOSIUM, 2001, : 135 - 151
  • [2] Threats to Cyber Security: The Dangers of Malicious Mobile Code, Users, and the iPhone
    Thaanum, Jason D.
    JOURNAL OF APPLIED SECURITY RESEARCH, 2013, 8 (04) : 490 - 509
  • [3] MALICIOUS CODE DETECTION WITH INTEGRATED BEHAVIOR ANALYSIS
    Li, Xiao-Yong
    Liu, Wei-Wei
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 2797 - 2801
  • [4] Information Security: New Threats or Familiar Problems?
    Kessler, Gary C.
    COMPUTER, 2012, 45 (02) : 59 - 65
  • [5] Simulation on static detection of malicious code based on behavior information gain
    Wei, Pengcheng
    Shi, Chengxiang
    He, Fangcheng
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (06) : 7683 - 7692
  • [7] Analysis of Research on Specific Insider Information Security Threats
    Zaytsev, Anton
    Malyuk, Anatoly
    Miloslavskaya, Natalia
    RECENT ADVANCES IN INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2, 2017, 570 : 725 - 735
  • [8] Information Security Threats Analysis for E-Learning
    Alwi, Najwa Hayaati Mohd
    Fan, Ip-Shing
    TECHNOLOGY ENHANCED LEARNING: QUALITY OF TEACHING AND EDUCATIONAL REFORM, 2010, 73 : 285 - 291
  • [9] Analysis of the Information Security Threats in the Digital Production Networks
    Dakhnovich, A. D.
    Moskvin, D. A.
    Zegzhda, D. P.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 1071 - 1075
  • [10] Security analysis of vulnerabilities and threats for medical information systems
    Ju, Tea Kyung
    Hong, Chong Min
    Shin, Weon
    ICIC Express Letters, 2015, 9 (03): : 849 - 854