Comparative study of recent mea malware phylogeny

J Moubarak, M Chamoun, E Filiol - 2017 2nd International …, 2017 - ieeexplore.ieee.org
J Moubarak, M Chamoun, E Filiol
2017 2nd International Conference on Computer and Communication …, 2017ieeexplore.ieee.org
Governments in the MEA did not take cyberwarfare seriously a few years ago. Nowadays,
there is a shift to a more concerned posture on the subject of cyber security after a series of
public revelations of networks being penetrated around the region. The struggle unpacked
by the Stuxnet malware in 2009 and then pursued through Duqu, Flame, Shamoon, Gauss,
Duqu2. 0, Shamoon 2.0 and Stonedrill malware. This paper is a technical survey and a proof
of concept of the operating vectors utilized by these malware. It takes this very complex …
Governments in the MEA did not take cyberwarfare seriously a few years ago. Nowadays, there is a shift to a more concerned posture on the subject of cyber security after a series of public revelations of networks being penetrated around the region. The struggle unpacked by the Stuxnet malware in 2009 and then pursued through Duqu, Flame, Shamoon, Gauss, Duqu2.0, Shamoon 2.0 and Stonedrill malware. This paper is a technical survey and a proof of concept of the operating vectors utilized by these malware. It takes this very complex approach, and shows how common stealth and evasion functions and similar stealth methodologies have greatly abridged this undertaking. It provides the understanding needed to analyze and go through the history and development of the most remarkable attacks in the Middle East, their objectives and describes the similarities involved in that process. However, it focuses this around the actual downsides of each malware analyzed and what make it vulnerable or detected. The main purpose of this paper is to highlight the phylogenetic aspects infused in cyberattacks.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果