2023
DOI: 10.3390/s23156757
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response

Lucian Florin Ilca,
Ogruţan Petre Lucian,
Titus Constantin Balan

Abstract: In this study, the methodology of cyber-resilience in small and medium-sized organizations (SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware analysis, detection and response using open-source solutions is proposed for detecting new emerging threats. By leveraging open-source solutions and software, a system specifically designed for SMEs with up to 250 employees is developed, focusing on the detection of new threats. Through extensive testing and validation, as well as efficie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 35 publications
0
10
0
Order By: Relevance
“…Sandboxing with integrated threat intelligence represents a sophisticated and effective approach to malware analysis and detection by combining isolated environments with up-to-date threat intelligence [70][71][72]. This method offers a comprehensive and dynamic means of understanding and identifying malicious software.…”
Section: Sandboxing With Threat Intelligence Integrationmentioning
confidence: 99%
See 1 more Smart Citation
“…Sandboxing with integrated threat intelligence represents a sophisticated and effective approach to malware analysis and detection by combining isolated environments with up-to-date threat intelligence [70][71][72]. This method offers a comprehensive and dynamic means of understanding and identifying malicious software.…”
Section: Sandboxing With Threat Intelligence Integrationmentioning
confidence: 99%
“…In the field of malware detection using deep learning, there are several challenges that need to be addressed and promising avenues for future research [23, [73][74][75][76][77][78][79][80][81][82][83][84][85]. Figure 5 illustrates the open challenges associated with the deep learning-powered malware detection in cyberspace.…”
Section: Open Challengesmentioning
confidence: 99%
“…The importance of the challenges is emphasized by many valuable features to both customers and organizations, including reduced expenses, improved productivity, rapidity, reliability, efficiency, and security. The application that is intended to harm and destroy systems and devices is known as intrusive malware, or malware [2]. Some common types of malwares include malicious software, spyware, viruses infections, and rootkits.…”
Section: Introductionmentioning
confidence: 99%
“…A VMware system is an information technology solution that creates and manages computer instances virtual machines (VMs) using VMware's virtualization technologies [1]. Because virtual systems allow for the abstraction and distribution of physical hardware components like the central processing unit, memory, storage, and the internet they can be flexible, effective, and scalable in a VMware context.…”
Section: Introductionmentioning
confidence: 99%