A survey of zero-day malware attacks and its detection methodology

被引:0
|
作者
Radhakrishnan, Kiran [1 ]
Menon, Rajeev R. [1 ]
Nath, Hiran V. [1 ]
机构
[1] Natl Inst Technol Calicut, Dept Comp Sci & Engn, Kozhikode, India
关键词
zero-days; malware; cryptojacking; detection; analysis;
D O I
10.1109/tencon.2019.8929620
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The recent malware outbreaks have shown that the existing end-point security solutions are not robust enough to secure the systems from getting compromised. The techniques, like code obfuscation along with one or more zero-days, are used by malware developers for evading the security systems. These malwares are used for large-scale attacks involving Advanced Persistent Threats(APT), Botnets, Cryptojacking, etc. Cryptojacking poses a severe threat to various organizations and individuals. We are summarising multiple methods available for the detection of malware.
引用
收藏
页码:533 / 539
页数:7
相关论文
共 50 条
  • [31] Protecting Embedded Systems from Zero-Day Attacks
    Taylor, Stephen
    [J]. NAECON 2018 - IEEE NATIONAL AEROSPACE AND ELECTRONICS CONFERENCE, 2018, : 165 - 168
  • [32] Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar
    Okazaki, Naonobu
    Usuzaki, Shotaro
    Waki, Tsubasa
    Kawagoe, Hyoga
    Park, Mirang
    Yamaba, Hisaaki
    Aburada, Kentaro
    [J]. FUTURE INTERNET, 2024, 16 (08)
  • [33] When Machine Learning Meets Hardware Cybersecurity: Delving into Accurate Zero-Day Malware Detection
    He, Zhangying
    Miari, Tahereh
    Makrani, Hosein Mohammadi
    Aliasgari, Mehrdad
    Homayoun, Houman
    Sayadi, Hossein
    [J]. PROCEEDINGS OF THE 2021 TWENTY SECOND INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN (ISQED 2021), 2021, : 85 - 90
  • [34] PlausMal-GAN: Plausible Malware Training Based on Generative Adversarial Networks for Analogous Zero-Day Malware Detection
    Won, Dong-Ok
    Jang, Yong-Nam
    Lee, Seong-Whan
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) : 82 - 94
  • [35] Real-Time Detection of Distributed Zero-Day Attacks in ad hoc Networks
    Cannady, James
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 72 - 81
  • [36] Practical Correlation Analysis between Scan and Malware Profiles against Zero-Day Attacks Based on Darknet Monitoring
    Nakao, Koji
    Inoue, Daisuke
    Eto, Masashi
    Yoshioka, Katsunari
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2009, E92D (05): : 787 - 798
  • [37] A zero-day resistant malware detection method for securing Cloud using SVM and Sandboxing Techniques
    Kumar, Saket
    Singh, Chandra Bhim Bhan
    [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1397 - 1402
  • [38] An adaptable deep learning-based intrusion detection system to zero-day attacks
    Soltani, Mahdi
    Ousat, Behzad
    Siavoshani, Mahdi Jafari
    Jahangir, Amir Hossein
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 76
  • [39] A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture
    Liu, Wenyan
    Chen, Fucai
    Hu, Hongchao
    Cheng, Guozhen
    Huo, Shumin
    Liang, Hao
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 50 - 53
  • [40] Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders
    Kim, Jin-Young
    Bu, Seok-Jun
    Cho, Sung-Bae
    [J]. INFORMATION SCIENCES, 2018, 460 : 83 - 102