A survey of zero-day malware attacks and its detection methodology

被引:0
|
作者
Radhakrishnan, Kiran [1 ]
Menon, Rajeev R. [1 ]
Nath, Hiran V. [1 ]
机构
[1] Natl Inst Technol Calicut, Dept Comp Sci & Engn, Kozhikode, India
关键词
zero-days; malware; cryptojacking; detection; analysis;
D O I
10.1109/tencon.2019.8929620
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The recent malware outbreaks have shown that the existing end-point security solutions are not robust enough to secure the systems from getting compromised. The techniques, like code obfuscation along with one or more zero-days, are used by malware developers for evading the security systems. These malwares are used for large-scale attacks involving Advanced Persistent Threats(APT), Botnets, Cryptojacking, etc. Cryptojacking poses a severe threat to various organizations and individuals. We are summarising multiple methods available for the detection of malware.
引用
收藏
页码:533 / 539
页数:7
相关论文
共 50 条
  • [21] IoTZeroJar: Towards a Honeypot Architecture for Detection of Zero-Day Attacks in IoT
    Ellouh, Mahmoud
    Ghaleb, Mustafa
    Felemban, Muhamad
    [J]. Proceedings - 2022 14th IEEE International Conference on Computational Intelligence and Communication Networks, CICN 2022, 2022, : 765 - 771
  • [22] Detection of zero-day attacks in computer networks using combined classification
    Gavari Bami, Hamid
    Moharamkhani, Elaheh
    Zadmehr, Behrouz
    Najafpoor, Vahid
    Shokouhifar, Mohammad
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (27):
  • [23] Anomaly Detection of Zero-Day Attacks Based on CNN and Regularization Techniques
    Ibrahim Hairab, Belal
    Aslan, Heba K.
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    [J]. ELECTRONICS, 2023, 12 (03)
  • [24] Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach
    Kumar, Rajesh
    Subbiah, Geetha
    [J]. SENSORS, 2022, 22 (07)
  • [25] Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
    Ali, Shamshair
    Rehman, Saif Ur
    Imran, Azhar
    Adeem, Ghazif
    Iqbal, Zafar
    Kim, Ki-Il
    [J]. ELECTRONICS, 2022, 11 (23)
  • [26] Adversarial Variational Modality Reconstruction and Regularization for Zero-Day Malware Variants Similarity Detection
    Molloy, Christopher
    Banks, Jeremy
    Ding, Steven H. H.
    Charland, Philippe
    Walenstein, Andrew
    Li, Litao
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2022, : 1131 - 1136
  • [27] Defence against the dark art of zero-day attacks
    Madou, Matias
    [J]. Network Security, 2022, 2022 (11)
  • [28] Efficient detection of zero-day Android Malware using Normalized Bernoulli Naive Bayes
    Sayfullina, Luiza
    Eirola, Emil
    Komashinsky, Dmitry
    Palumbo, Paolo
    Miche, Yoan
    Lendasse, Amaury
    Karhunen, Juha
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 198 - 205
  • [29] Detecting and Analyzing Zero-day Attacks using Honeypots
    Musca, Constantin
    Mirica, Emma
    Deaconescu, Razvan
    [J]. 19TH INTERNATIONAL CONFERENCE ON CONTROL SYSTEMS AND COMPUTER SCIENCE (CSCS 2013), 2013, : 543 - 548
  • [30] Mitigation and Detection of Zero-Day Vulnerabilities
    Sebastian Guisao, Juan
    Toro Rendon, Juan Carlos
    [J]. CUADERNO ACTIVA, 2014, (06): : 63 - 67