A Review of State-of-the-Art Malware Attack Trends and Defense Mechanisms

被引:18
作者
Ferdous, Jannatul [1 ]
Islam, Rafiqul [2 ]
Mahboubi, Arash [3 ]
Islam, Md. Zahidul [4 ]
机构
[1] Charles Sturt Univ, Sch Comp Math & Engn, Wagga Wagga, NSW 2650, Australia
[2] Charles Sturt Univ, Sch Comp Math & Engn, Albury, NSW 2640, Australia
[3] Charles Sturt Univ, Sch Comp & Math, Port Macquarie, NSW 2444, Australia
[4] Charles Sturt Univ, Sch Comp Math & Engn, Bathurst, NSW 2795, Australia
关键词
Malware; Market research; Ransomware; Trojan horses; Security; Rootkit; Internet of Things; Machine learning; Malware evolution; malware attack trends; defense mechanisms; malware detection; machine learning; deep learning; ADVANCED PERSISTENT THREAT; RANSOMWARE; MACHINE; SYSTEM; FRAMEWORK; CLASSIFICATION; BACKUP;
D O I
10.1109/ACCESS.2023.3328351
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing sophistication of malware threats has led to growing concerns in the anti-malware community, as malware poses a significant danger to online users despite the availability of numerous defense solutions. This study aims to comprehensively review malware evolution and current attack trends to identify effective defense mechanisms. It reviews the most recent journal articles, conference proceedings, reports, and online resources published during the last five years. We extensively review the malware landscape from 1970 to the present and analyze malware types, operational mechanisms, attack vectors, and vulnerabilities. Furthermore, we explore different defensive strategies developed in response to these evolving threats. Our findings highlight the increasing sophistication of malware attack trends, including a surge in cryptojacking, attacks on mobile devices, Internet of Things devices, ransomware, advanced persistent threats, supply chain attacks, fileless malware, cloud-based attacks, exploitation of remote employees, and attack trends on edge networks. Defense strategies have also evolved in parallel, emphasizing multilayered security measures to counter these dynamic threats. This study highlights the critical need for robust, multilayered security measures to combat dynamic malware. Despite these advancements, some open challenges and significant research gaps remain, which require further innovation. This review serves as a valuable guide for cybersecurity professionals by identifying the key trends, challenges, limitations, and future cybersecurity research opportunities.
引用
收藏
页码:121118 / 121141
页数:24
相关论文
共 185 条
[1]   Behavior-based ransomware classification: A particle swarm optimization wrapper-based approach for feature selection [J].
Abbasi, Muhammad Shabbir ;
Al-Sahaf, Harith ;
Mansoori, Masood ;
Welch, Ian .
APPLIED SOFT COMPUTING, 2022, 121
[2]   HCL-Classifier: CNN and LSTM based hybrid malware classifier for Internet of Things (IoT) [J].
Abdullah, Muhammed Amin ;
Yu, Yongbin ;
Adu, Kwabena ;
Imrana, Yakubu ;
Wang, Xiangxiang ;
Cai, Jingye .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 142 :41-58
[3]   Malware Detection Issues, Challenges, and Future Directions: A Survey [J].
Aboaoja, Faitouri A. ;
Zainal, Anazida ;
Ghaleb, Fuad A. ;
Al-rimy, Bander Ali Saleh ;
Eisa, Taiseer Abdalla Elfadil ;
Elnour, Asma Abbas Hassan .
APPLIED SCIENCES-BASEL, 2022, 12 (17)
[4]   Malware classification and composition analysis: A survey of recent developments [J].
Abusitta, Adel ;
Li, Miles Q. ;
Fung, Benjamin C. M. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59
[5]   Malware Dynamic Analysis Evasion Techniques: A Survey [J].
Afianian, Amir ;
Niksefat, Salman ;
Sadeghiyan, Babak ;
Baptiste, David .
ACM COMPUTING SURVEYS, 2020, 52 (06)
[6]   Crypto-ransomware early detection model using novel incremental bagging with enhanced semi-random subspace selection [J].
Al-rimy, Bander Ali Saleh ;
Maarof, Mohd Aizaini ;
Shaid, Syed Zainudeen Mohd .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 :476-491
[7]   Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art [J].
Aldauiji, Fatimah ;
Batarfi, Omar ;
Bayousef, Manal .
IEEE ACCESS, 2022, 10 :61695-61706
[8]  
Alenezi MN., 2020, International Journal of Communication Networks and Information Security (IJCNIS), V12, P326, DOI DOI 10.17762/IJCNIS.V12I3.4723
[9]   A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms [J].
Alex, Christin ;
Creado, Giselle ;
Almobaideen, Wesam ;
Abu Alghanam, Orieb ;
Saadeh, Maha .
COMPUTERS & SECURITY, 2023, 132
[10]   Effective Multitask Deep Learning for IoT Malware Detection and Identification Using Behavioral Traffic Analysis [J].
Ali, Sajid ;
Abusabha, Omar ;
Ali, Farman ;
Imran, Muhammad ;
Abuhmed, Tamer .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (02) :1199-1209