A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments

被引:3
|
作者
Choi, Seul-Ki [1 ]
Lee, Taejin [2 ]
Kwak, Jin [3 ]
机构
[1] Ajou Univ, Dept Comp Engn, ISAA Lab, Suwon, South Korea
[2] Hoseo Univ, Dept Comp Engn, Asan, South Korea
[3] Ajou Univ, Dept Cyber Secur, Suwon, South Korea
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2019年 / 13卷 / 03期
基金
新加坡国家研究基金会;
关键词
Cyber security; Malicious code; Malware; Security threat;
D O I
10.3837/tiis.2019.03.028
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of new technologies and devices brings a new environment in the field of cyber security. It is not easy to predict possible security threats about new environment every time without special criteria. In other words, most malicious codes often reuse malicious code that has occurred in the past, such as bypassing detection from anti-virus or including additional functions. Therefore, we are predicting the security threats that can arise in a new environment based on the history of repeated malicious code. In this paper, we classify and define not only the internal information obtained from malicious code analysis but also the features that occur during infection and attack. We propose a method to predict and manage security threats in new environment by continuously managing and extending.
引用
收藏
页码:1611 / 1625
页数:15
相关论文
共 50 条
  • [21] Information seeking behavior in new searching environments
    Cool, C
    Park, S
    Belkin, N
    Koenemann, J
    Ng, KB
    COLIS 2 - SECOND INTERNATIONAL CONFERENCE ON CONCEPTIONS OF LIBRARY AND INFORMATION SCIENCE: INTEGRATION IN PERSPECTIVE, PROCEEDINGS, 1996, : 403 - 416
  • [22] Predicting the security threats on the spreading of rumor, false information of Facebook content based on the principle of sociology
    Wang, Xiaomeng
    Fang, Binxing
    Zhang, Hongli
    Wang, Xing
    COMPUTER COMMUNICATIONS, 2020, 150 : 455 - 462
  • [23] Predicting New Attacks: A Case Study in Security Analysis of Cryptographic Protocols
    Bao, Da
    Wagatsuma, Kazunori
    Gao, Hongbiao
    Cheng, Jingde
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 263 - 270
  • [24] Static detection of application backdoorsDetecting both malicious software behavior and malicious indicators from the static analysis of executable code
    Chris Wysopal
    Chris Eng
    Tyler Shields
    Datenschutz und Datensicherheit - DuD, 2010, 34 (3) : 149 - 155
  • [25] Analysis and Its solution on Security Threats in SIP-based Mobility Support Environments
    Ryu, Jea-Tek
    Roh, Byeong-hee
    Hong, Man-Pyo
    Kim, Hwan-Kuk
    Kim, Jeong-Wook
    IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 686 - +
  • [26] Static detection and simulation of malicious code in a metallurgical master control station based on behavior information gain
    Hu, Tingfeng
    Engineering Intelligent Systems, 2020, 28 (01): : 15 - 22
  • [27] Analysis of personal information security behavior and awareness
    Ogutcu, Gizem
    Tastik, Ozlem Muge
    Chouseinoglou, Oumout
    COMPUTERS & SECURITY, 2016, 56 : 83 - 93
  • [28] Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
    Shropshire, Jordan
    Warkentin, Merrill
    Sharma, Shwadhin
    COMPUTERS & SECURITY, 2015, 49 : 177 - 191
  • [29] Threats and risks to information security: A practical analysis of free access wireless networks
    Quirumbay, Daniel I.
    Coronel, Ivan A.
    Bayas, Marcia M.
    Rovira, Ronald H.
    Gromaszek, Konrad
    Tleshova, Akmaral
    Kozbekova, Ainur
    PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH ENERGY PHYSICS EXPERIMENTS 2017, 2017, 10445
  • [30] Social Media Information Security Threats: Anthropomorphic Emoji Analysis on Social Engineering
    Njenga, Kennedy
    IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 185 - 192