Using Malware Self-Defence Mechanism to Harden Defence and Remediation Tools
نویسنده
چکیده
Malware are becoming a major problem to every individual and organization in the cyber world. They are advancing in sophistication in many ways. Besides their advanced abilities to penetrate and stay evasive against detection and remediation, they have strong resilience mechanisms that are defying all attempts to eradicate them. Malware are also attacking defence of the systems and making them defunct. When defences are brought down, the organisation or individual will lose control over the IT assets and defend against the Malware perpetuators. In order to gain the capability to defend, it is necessary to keep the defences or remediation tools active and not defunct. Given that Malware have proven to be resilient against deployed defences and remediation tools, the proposed research advocates to utilize the techniques used by Malware to harden the tools in a similar manner. In this paper, it is demonstrated that the proposition of using Malware’s resilient designs can be applied to harden the tools through experiments.
منابع مشابه
Papaya Dieback in Malaysia: A StepTowards A New Insight of Disease Resistance
A recently published article describing the draft genome of Erwiniamallotivora BT-Mardi (1), the causal pathogen of papaya dieback infection in Peninsular Malaysia, hassignificant potential to overcome and reduce the effect of this vulnerable crop (2). The authors found that the draft genome sequenceis approximately 4824 kbp and the G+C content of the genomewas 52-54%, which is very similarto t...
متن کاملStudy of environmental management systems on defence
The effective and sustainable environmental performance of a business is a result of various factors and most important the integrated outcome of the environmental management. Likewise, the integration of environmental protection into the armed forces functions has also gain interest for the military sector internationally. Therefore, the environmental management system (EMS) is recognized as o...
متن کاملAutomatically Detecting and Removing Malware Using Dynamic Analysis Systems
This paper presents a system that detects unknown malware in user PCs, and automatically creates tools that restore the PCs to the pre-infection states. This system incorporates with dynamic malware analysis systems to detect malware, and creates remediation tools based on the analysis reports. Using the behavior information in the reports, the remediation tools not only delete the malware, but...
متن کاملMalware variant detection
Malware programs (e.g., viruses, worms, Trojans, etc.) are a worldwide epidemic. Studies and statistics show that the impact of malware is getting worse. Malware detectors are the primary tools in the defence against malware. Most commercial anti-malware scanners maintain a database of malware patterns and heuristic signatures for detecting malicious programs within a computer system. Malware w...
متن کاملQuantitative Plausibility of the Trojan Horse Defence against Possession of Child Pornography
A new complexity-based metric has been developed to enable the relative plausibility of competing explanations for the existence of uncontested evidence to be determined quantitatively. This metric has been applied to the case of the Trojan horse defence against the possession of child pornography. Our results demonstrate that the Trojan horse defence in this case cannot be plausibly sustained,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1801.01970 شماره
صفحات -
تاریخ انتشار 2018