2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN) 2019
DOI: 10.1109/icscan.2019.8878680
|View full text |Cite|
|
Sign up to set email alerts
|

Notice of Violation of IEEE Publication Principles: A study to Understand Malware Behavior through Malware Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…[44][45][46] Cybercrime Criminal activity either targets or uses a computer, a computer network, or a networked device. [47,48] Malware Malicious software designed to infiltrate a device without knowledge [49,50] DDoS Denial of service attack on a computer system or network that causes a service or resource tobe inaccessible to legitimate users [51][52][53][54][55] Ransomware A type of malicious program that restricts access to certain parts of files of the infected operating system and demands a ransom in exchange for removing this restriction [56][57][58][59][60] Mobile malware Its name suggests malicious software that targets explicitly the operating systems on mobile phones [61][62][63][64] Watering hole Refers to a tactic used during targeted attack campaigns where the APT is distributed through a trusted website that is usually visited by employees of the target company or entity [65,66] We contrasted this result with an international organization related to cybersecurity. We found that some of them were considered the most relevant cyberattacks in the year 2020, according to The European Union Agency for Cybersecurity (ENISA) [34].…”
Section: Type Description Referencementioning
confidence: 99%
“…[44][45][46] Cybercrime Criminal activity either targets or uses a computer, a computer network, or a networked device. [47,48] Malware Malicious software designed to infiltrate a device without knowledge [49,50] DDoS Denial of service attack on a computer system or network that causes a service or resource tobe inaccessible to legitimate users [51][52][53][54][55] Ransomware A type of malicious program that restricts access to certain parts of files of the infected operating system and demands a ransom in exchange for removing this restriction [56][57][58][59][60] Mobile malware Its name suggests malicious software that targets explicitly the operating systems on mobile phones [61][62][63][64] Watering hole Refers to a tactic used during targeted attack campaigns where the APT is distributed through a trusted website that is usually visited by employees of the target company or entity [65,66] We contrasted this result with an international organization related to cybersecurity. We found that some of them were considered the most relevant cyberattacks in the year 2020, according to The European Union Agency for Cybersecurity (ENISA) [34].…”
Section: Type Description Referencementioning
confidence: 99%
“…The equation (5) would be used as constraints of model learning. If the dataset has n characteristic functions f i (x, y), i = 1, 2, .…”
Section: B Weight Computingmentioning
confidence: 99%
“…Recently, researchers have shown an increased interest in the detection based on more fundamental signatures, like API and opcode. Some related works focus on dynamic malware detectors based on system-calls [5]. They have analyzed existed malware and generated system call sequences or calls flow graph (CFG).…”
Section: Introductionmentioning
confidence: 99%
“…In response to the low-latency, high-reliability characteristics of the industrial IoT, edge computing devices are highly susceptible to being injected with malware [13] that is highly sophisticated and resource-consuming. Thereby corrupting edge data on a massive scale, leading to DoS attacks [14].…”
Section: Introductionmentioning
confidence: 99%