Anatomy of targeted attacks with smart malware

被引:5
作者
Bahtiyar, Serif [1 ]
机构
[1] Bogazici Univ, Dept Comp Engn, TR-34342 Istanbul, Turkey
关键词
smart malware; security; targeted attack; INFORMATION SECURITY; CYBER SECURITY; BEHAVIOR; NETWORKS; STUXNET; VIRUS;
D O I
10.1002/sec.1767
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The expansive connectivity of information systems has set the stage for pervasive malware to leverage multiple attack vectors and propagation methods. In doing so, this malware has taken on the complexity and richness of the very society it endeavors to control. Defending against it is therefore exceptionally difficult because defense systems have no autonomy in perceiving threats of complex malware and reacting against it. In this paper, smart malware model is defined as emerging complex malware that may be used by defense systems to perceive complex malware and reacting to its attacks. A targeted attack is also presented to show the difficulty of defending systems against smart malware. It is also compared with conventional malware to analyze malware types. Moreover, a numerical study about smart malware is presented to evaluate the proposed model in a more precise manner. The comparison and the numerical study show that our model can be used to perceive smart malware autonomously by automated tools. Copyright (C) 2017 John Wiley & Sons, Ltd.
引用
收藏
页码:6215 / 6226
页数:12
相关论文
共 53 条
[1]   Malicious and Spam Posts in Online Social Networks [J].
Abu-Nimeh, Saeed ;
Chen, Thomas M. ;
Alzubi, Omar .
COMPUTER, 2011, 44 (09) :23-28
[2]  
[Anonymous], TRENDS 2013 AST GROW
[3]   Countermeasure graphs for software security risk assessment: An action research [J].
Baca, Dejan ;
Petersen, Kai .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (09) :2411-2428
[4]   A Survey of Botnet Technology and Defenses [J].
Bailey, Michael ;
Cooke, Evan ;
Jahanian, Farnam ;
Xu, Yunjing ;
Karir, Manish .
CATCH 2009: CYBERSECURITY APPLICATIONS AND TECHNOLOGY CONFERENCE FOR HOMELAND SECURITY, PROCEEDINGS, 2009, :299-+
[5]   Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead [J].
Baldini, Gianmarco ;
Sturman, Taj ;
Biswas, Abdur Rahim ;
Leschhorn, Ruediger ;
Godor, Gyoezoe ;
Street, Michael .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02) :355-379
[6]   Detecting Kernel-Level Rootkits Using Data Structure Invariants [J].
Baliga, Arati ;
Ganapathy, Vinod ;
Iftode, Liviu .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) :670-684
[7]  
Bing S, 2012, MCAFEE THREATS REPOR
[8]  
Bravo P., 2011, 2011 Sixth International Conference on Availability, Reliability and Security, P515, DOI 10.1109/ARES.2011.78
[9]   Detection of Mobile Malware in the Wild [J].
Chandramohan, Mahinthan ;
Tan, Hee Beng Kuan .
COMPUTER, 2012, 45 (09) :65-71
[10]   Smart Attacks in Smart Grid Communication Networks [J].
Chen, Pin-Yu ;
Cheng, Shin-Ming ;
Chen, Kwang-Cheng .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (08) :24-29