A survey of zero-day malware attacks and its detection methodology
Title | A survey of zero-day malware attacks and its detection methodology |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Radhakrishnan, Kiran, Menon, Rajeev R, Nath, Hiran V |
Conference Name | TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON) |
Date Published | Oct. 2019 |
Publisher | IEEE |
ISBN Number | 978-1-7281-1895-6 |
Keywords | advanced persistent threats, Analysis, APT, Botnet, botnets, Code Obfuscation, cryptography, cryptojacking, detection, detection methodology, Electronic mail, end-point security solutions, Human Behavior, human factors, invasive software, large-scale attacks, Malware, malware detection, malware developers, malware outbreaks, Metrics, Privacy-invasive software, pubcrawl, resilience, Resiliency, security systems, zero-day malware attacks, zero-days |
Abstract | The recent malware outbreaks have shown that the existing end-point security solutions are not robust enough to secure the systems from getting compromised. The techniques, like code obfuscation along with one or more zero-days, are used by malware developers for evading the security systems. These malwares are used for large-scale attacks involving Advanced Persistent Threats(APT), Botnets, Cryptojacking, etc. Cryptojacking poses a severe threat to various organizations and individuals. We are summarising multiple methods available for the detection of malware. |
URL | https://ieeexplore.ieee.org/document/8929620 |
DOI | 10.1109/TENCON.2019.8929620 |
Citation Key | radhakrishnan_survey_2019 |
- invasive software
- zero-days
- zero-day malware attacks
- security systems
- Resiliency
- resilience
- pubcrawl
- Privacy-invasive software
- Metrics
- malware outbreaks
- malware developers
- malware detection
- malware
- large-scale attacks
- advanced persistent threats
- Human Factors
- Human behavior
- end-point security solutions
- Electronic mail
- detection methodology
- detection
- cryptojacking
- Cryptography
- Code Obfuscation
- botnets
- botnet
- APT
- analysis