A survey of zero-day malware attacks and its detection methodology

K Radhakrishnan, RR Menon… - TENCON 2019-2019 …, 2019 - ieeexplore.ieee.org
TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 2019ieeexplore.ieee.org
The recent malware outbreaks have shown that the existing end-point security solutions are
not robust enough to secure the systems from getting compromised. The techniques, like
code obfuscation along with one or more zero-days, are used by malware developers for
evading the security systems. These malwares are used for large-scale attacks involving
Advanced Persistent Threats (APT), Botnets, Cryptojacking, etc. Cryptojacking poses a
severe threat to various organizations and individuals. We are summarising multiple …
The recent malware outbreaks have shown that the existing end-point security solutions are not robust enough to secure the systems from getting compromised. The techniques, like code obfuscation along with one or more zero-days, are used by malware developers for evading the security systems. These malwares are used for large-scale attacks involving Advanced Persistent Threats(APT), Botnets, Cryptojacking, etc. Cryptojacking poses a severe threat to various organizations and individuals. We are summarising multiple methods available for the detection of malware.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果