首页 | 本学科首页   官方微博 | 高级检索  
     


A Survey on malware analysis and mitigation techniques
Affiliation:1. University of Tsukuba, Tsukuba, Japan;2. RIKEN Center for Advanced Intelligence Project, Japan;3. JST CREST, Japan;1. Institute for Informatics and Telematics, National Research Council of Italy (CNR), Pisa, Italy;2. Department of Engineering, University of Sannio, Benevento, Italy;3. Department of Medicine and Health Sciences “Vincenzo Tiberio”, University of Molise, Campobasso, Italy;4. Department of Information Engineering, University of Pisa, Pisa, Italy
Abstract:In recent days, malwares are advanced, sophisticatedly engineered to attack the target. Most of such advanced malwares are highly persistent and capable of escaping from the security systems. This paper explores such an advanced malware type called Advanced Persistent Threats (APTs). APTs pave the way for most of the Cyber espionages and sabotages. APTs are highly sophisticated, target specific and operate in a stealthy mode till the target is compromised. The intention of the APTs is to deploy target specific automated malwares in a host or network to initiate an on-demand attack based on continuous monitoring. Encrypted covert communication and advanced, sophisticated attack techniques make the identification of APTs more challenging. Conventional security systems like antivirus, anti-malware systems which depend on signatures and static analysis fail to identify these APTs. The Advanced Evasive Techniques (AET) used in APTs are capable of bypassing the stateful firewalls housed in the enterprise choke points at ease. Hence, this paper presents a detailed study on sophisticated attack and evasion techniques used by the contemporary malwares. Furthermore, existing malware analysis techniques, application hardening techniques and CPU assisted application security schemes are also discussed. Finally, the study concludes by presenting the System and Network Security Design (SNSD) using existing mitigation techniques.
Keywords:Evasion  Malware  Malware analysis  Packers  Sandboxes  Advanced persistent threats
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号