Loading…

Anatomy of targeted attacks with smart malware

The expansive connectivity of information systems has set the stage for pervasive malware to leverage multiple attack vectors and propagation methods. In doing so, this malware has taken on the complexity and richness of the very society it endeavors to control. Defending against it is therefore exc...

Full description

Saved in:
Bibliographic Details
Published in:Security and communication networks 2016-12, Vol.9 (18), p.6215-6226
Main Author: Bahtiyar, Serif
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The expansive connectivity of information systems has set the stage for pervasive malware to leverage multiple attack vectors and propagation methods. In doing so, this malware has taken on the complexity and richness of the very society it endeavors to control. Defending against it is therefore exceptionally difficult because defense systems have no autonomy in perceiving threats of complex malware and reacting against it. In this paper, smart malware model is defined as emerging complex malware that may be used by defense systems to perceive complex malware and reacting to its attacks. A targeted attack is also presented to show the difficulty of defending systems against smart malware. It is also compared with conventional malware to analyze malware types. Moreover, a numerical study about smart malware is presented to evaluate the proposed model in a more precise manner. The comparison and the numerical study show that our model can be used to perceive smart malware autonomously by automated tools. Copyright © 2017 John Wiley & Sons, Ltd. Smart malware model is defined as emerging complex malware that may be used by defense systems to perceive complex malware and reacting to its attacks. Conventional malware and smart malware are compared to identify features of smart malware. A targeted attack is presented to show the difficulty of defending systems against smart malware.
ISSN:1939-0114
1939-0122
DOI:10.1002/sec.1767