Pervasive Malware Propagation Mechanism and Mitigation Techniques

نویسندگان

  • Amit Kumar
  • Pallavi Kulkarni
  • Shui Yu
  • Song Guo
  • Ivan Stojmenovic
  • Ajay Gupta
  • Daniel C. Du Varney
  • Kevin M. Carter
  • Nwokedi Idika
  • Seungwon Shin
  • Guofei Gu
  • Narasimha Reddy
  • Christopher P. Lee
  • Zesheng Chen
  • Chuanyi Ji
  • An
  • Sheng Wen
  • Wei Zhou
  • Jun Zhang
  • Yang
  • Krishna K. Ramachandran
  • Ping Wang
  • Sherri Sparks
چکیده

Malwares i.e. malicious code/softwares poses prevalent threat to businesses and network across distributed systems. Like it is said in order to catch criminals, we have to think like a criminal, likewise in order to catch cyber criminals/terrorists, we have to think like a cyber-criminal. Malware campaigns have been the driving engines for cyber-warfare being used by cyber criminals & black hat hackers to target organizations, various governments, and financial institutions for leverage & selfish profits, since early decade. In the recent trends of past years, the sophistication of malware campaigns have grown more complex to perform targeted successful attacks and bypass the prevailing & evolving defense mechanisms out there. Our approach is motivated by the factor that malwares breed on the vulnerability of the software applications running across the web. Idea behind pervasive malware propagation mechanism is to provide insight towards various exploitable scenarios based on vulnerabilities and software coding flaws in the software system, its architecture and over the network. Understanding the control flow structure of malware propagation into the system & over the network provides greater insight into how vulnerabilities are being exploited , how target surface

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Internet Malware Propagation Models and Mitigation Strategies

the Internet application has been so popular in the recent times and the concepts of network worms are now the biggest threats to the network security researchers. The trend at which network structure variables and its related applications such as p2p network has given the malware on the internet an avenue to explore as rapidly as possible and to find ways from which they can propagate. Hence, ...

متن کامل

Action Languages and the Mitigation of Malware

Automating malware mitigation requires taking into account potentially intricate dependencies among the system’s components, understanding potential side-effects of the possible actions, and ensuring that required system functionalities are preserved. Answers still need to be found for fundamental questions: What does it mean to mitigate malware? When can one claim that malware has been mitigat...

متن کامل

Model and Dynamic Behavior of Malware Propagation over Wireless Sensor Networks

Based on the inherent characteristics of wireless sensor networks (WSN), the dynamic behavior of malware propagation in flat WSN is analyzed and investigated. A new model is proposed using 2-D cellular automata (CA), which extends the traditional definition of CA and establishes whole transition rules for malware propagation in WSN. Meanwhile, the validations of the model are proved through the...

متن کامل

Tapjacking Threats and Mitigation Techniques for Android Applications

With the increased dependency on web applications through mobile devices, malicious attack techniques have now shifted from traditional web applications running on desktop or laptop (allowing mouse click-based interactions) to mobile applications running on mobile devices (allowing touch-based interactions). Clickjacking is a type of malicious attack originating in web applications, where victi...

متن کامل

Genetic Algorithm Modeling Approach for Mobile Malware Evolution Forecasting

Mobile malware is a relatively new but constantly increasing threat to information security and modern means of communication. Mobile malware evolution speedup is highly expected due to the increase of the SmartPhone and other mobile device market and malware development shift from vandalism to economic aspect. Forecasting evolution tendencies is important for development of countermeasure tech...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015