2022
DOI: 10.1007/s00500-022-07447-4
|View full text |Cite
|
Sign up to set email alerts
|

Next-generation antivirus endowed with web-server Sandbox applied to audit fileless attack

Abstract: Background and Objective: Almost all malwares running on web-server are php codes. Then, the present paper creates a NGAV (Next Generation Antivirus) expert in auditing threats web-based, specifically from php files, in real time.Methods: In our methodology, the malicious behaviors, of the personal computer, serve as input attributes of the statistical learning machines. In all, our dynamic feature extraction monitors 11,777 behaviors that the web fileless attack can do when launched directly from a malicious … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 18 publications
0
4
0
Order By: Relevance
“…The morphological authorial kernels have contributed to the advancement of Information Security [26][28] [42]. Authorial kernels combine high accuracies, reduced training times and the self-adapt to any map features.…”
Section: Morphological Extreme Learning Machinesmentioning
confidence: 99%
See 1 more Smart Citation
“…The morphological authorial kernels have contributed to the advancement of Information Security [26][28] [42]. Authorial kernels combine high accuracies, reduced training times and the self-adapt to any map features.…”
Section: Morphological Extreme Learning Machinesmentioning
confidence: 99%
“…In dynamic analysis, sandboxes are excellent in order to audit suspicious files 6 . The actions investigated by the sandbox refer to changes in the operating system registry, files built, removed and transferred by the malware while running, traces of calls made by all processes generated by the malware file, memory dumps of the malware processes and network traffic tracking [26]. By default, sandbox audits operating system contained in virtual machine (controlled environment).…”
Section: Authorial Iot Next-generation Sandboxmentioning
confidence: 99%
“…( 6) defines the Dilation kernel inspired by morphological operator of Dilation. The inspiration and adaptation of the image processing technique can be seen in previous authorial works [18][20] [27].…”
Section: Classifiersmentioning
confidence: 99%
“…Morphological ELMs had positive results in many other cybersurveillance scenarios and could be applied to a broad array of electronic devices. It combines high accuracies, reduced training times and is able to self-adapt given any feature maps [18][20] [27].…”
Section: Classifiersmentioning
confidence: 99%