A survey of zero-day malware attacks and its detection methodology

被引:0
|
作者
Radhakrishnan, Kiran [1 ]
Menon, Rajeev R. [1 ]
Nath, Hiran V. [1 ]
机构
[1] Natl Inst Technol Calicut, Dept Comp Sci & Engn, Kozhikode, India
关键词
zero-days; malware; cryptojacking; detection; analysis;
D O I
10.1109/tencon.2019.8929620
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The recent malware outbreaks have shown that the existing end-point security solutions are not robust enough to secure the systems from getting compromised. The techniques, like code obfuscation along with one or more zero-days, are used by malware developers for evading the security systems. These malwares are used for large-scale attacks involving Advanced Persistent Threats(APT), Botnets, Cryptojacking, etc. Cryptojacking poses a severe threat to various organizations and individuals. We are summarising multiple methods available for the detection of malware.
引用
收藏
页码:533 / 539
页数:7
相关论文
共 50 条
  • [41] Federated Incremental Learning based Evolvable Intrusion Detection System for Zero-Day Attacks
    Jin, Dong
    Chen, Shuangwu
    He, Huasen
    Jiang, Xiaofeng
    Cheng, Siyu
    Yang, Jian
    [J]. IEEE NETWORK, 2023, 37 (01): : 125 - 132
  • [42] A Brief Review of Unsupervised Learning Algorithms for Zero-Day Attacks in Intrusion Detection Systems
    Oluwadare, Sunkanmi
    ElSayed, Zag
    Adekoya, Oluwaseun
    [J]. 2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [43] Information System Security Reinforcement with WGAN-GP for Detection of Zero-Day Attacks
    Mu, Ziyu
    Shi, Xiyu
    Dogan, Safak
    [J]. 2024 7TH INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND BIG DATA, ICAIBD 2024, 2024, : 105 - 110
  • [44] Unsupervised Algorithms to Detect Zero-Day Attacks: Strategy and Application
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    [J]. IEEE ACCESS, 2021, 9 : 90603 - 90615
  • [45] A framework for zero-day vulnerabilities detection and prioritization
    Singh, Umesh Kumar
    Joshi, Chanchala
    Kanellopoulos, Dimitris
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 164 - 172
  • [46] Zero-Day Signature Extraction for High-Volume Attacks
    Afek, Yehuda
    Bremler-Barr, Anat
    Feibish, Shir Landau
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2019, 27 (02) : 691 - 706
  • [47] Deep Neural Network and Transfer Learning for Accurate Hardware-Based Zero-Day Malware Detection
    He, Zhangying
    Rezaei, Amin
    Homayoun, Houman
    Sayadi, Hossein
    [J]. PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 27 - 32
  • [48] A Consensus Framework for Reliability and Mitigation of Zero-Day Attacks in IoT
    Sharma, Vishal
    Lee, Kyungroul
    Kwon, Soonhyun
    Kim, Jiyoon
    Park, Hyungjoon
    Yim, Kangbin
    Lee, Sun-Young
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [49] Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities
    Barros, Pedro H.
    Chagas, Eduarda T. C.
    Oliveira, Leonardo B.
    Queiroz, Fabiane
    Ramos, Heitor S.
    [J]. COMPUTERS & SECURITY, 2022, 120
  • [50] Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks
    Hairab, Belal Ibrahim
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    [J]. IEEE ACCESS, 2022, 10 : 98427 - 98440