A Survey on malware analysis and mitigation techniques

被引:99
作者
Chakkaravarthy, S. Sibi [1 ]
Sangeetha, D. [2 ]
Vaidehi, V. [3 ]
机构
[1] VIT AP, Sch Comp Sci & Engn, Amaravathi, India
[2] Anna Univ, Madras Inst Technol, Dept Informat Technol, Chennai, Tamil Nadu, India
[3] VIT, Sch Comp Sci & Engn, Chennai, Tamil Nadu, India
关键词
Evasion; Malware; Malware analysis; Packers; Sandboxes; Advanced persistent threats; ATTACKS; INTELLIGENCE;
D O I
10.1016/j.cosrev.2019.01.002
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent days, malwares are advanced, sophisticatedly engineered to attack the target. Most of such advanced malwares are highly persistent and capable of escaping from the security systems. This paper explores such an advanced malware type called Advanced Persistent Threats (APTs). APTs pave the way for most of the Cyber espionages and sabotages. APTs are highly sophisticated, target specific and operate in a stealthy mode till the target is compromised. The intention of the APTs is to deploy target specific automated malwares in a host or network to initiate an on-demand attack based on continuous monitoring. Encrypted covert communication and advanced, sophisticated attack techniques make the identification of APTs more challenging. Conventional security systems like antivirus, anti-malware systems which depend on signatures and static analysis fail to identify these APTs. The Advanced Evasive Techniques (AET) used in APTs are capable of bypassing the stateful firewalls housed in the enterprise choke points at ease. Hence, this paper presents a detailed study on sophisticated attack and evasion techniques used by the contemporary malwares. Furthermore, existing malware analysis techniques, application hardening techniques and CPU assisted application security schemes are also discussed. Finally, the study concludes by presenting the System and Network Security Design (SNSD) using existing mitigation techniques. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:1 / 23
页数:23
相关论文
共 89 条
[1]  
[Anonymous], SIGMAL STATIC SIGNAL
[2]  
[Anonymous], QUB OS SEC COMP
[3]  
[Anonymous], 2015 IEEE 17TH INTER
[4]  
[Anonymous], TITLE THREATS COUNTE
[5]  
[Anonymous], CARO WORKSH
[6]  
[Anonymous], PENTESTMAG NOV
[7]  
[Anonymous], 2013, SAUDI INT ELECT COMM, DOI DOI 10.1109/SIECPC.2013.6551028
[8]  
[Anonymous], IEEE SECUR PRIV
[9]  
[Anonymous], 21 ANN COMP SEC APPL
[10]  
[Anonymous], HINDAWI PUBLISHING C