Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges

I Kara - Expert Systems with Applications, 2023 - Elsevier
The rapid advancements in cyber-attack strategies are in parallel with the measures for
detection, analysis, and prevention. Attackers have recently developed fileless malware that …

A survey of mulval extensions and their attack scenarios coverage

D Tayouri, N Baum, A Shabtai, R Puzis - IEEE Access, 2023 - ieeexplore.ieee.org
Organizations employ various adversary models to assess the risk and potential impact of
attacks on their networks. A popular method of visually representing cyber risks is the attack …

Cyber-attack scoring model based on the offensive cybersecurity framework

K Kim, FA Alfouzan, H Kim - Applied Sciences, 2021 - mdpi.com
Cyber-attacks have become commonplace in the world of the Internet. The nature of cyber-
attacks is gradually changing. Early cyber-attacks were usually conducted by curious …

An insight into the machine-learning-based fileless malware detection

O Khalid, S Ullah, T Ahmad, S Saeed, DA Alabbad… - Sensors, 2023 - mdpi.com
In recent years, massive development in the malware industry changed the entire landscape
for malware development. Therefore, cybercriminals became more sophisticated by …

Sok: The mitre att&ck framework in research and practice

S Roy, E Panaousis, C Noakes, A Laszka… - arXiv preprint arXiv …, 2023 - arxiv.org
The MITRE ATT&CK framework, a comprehensive knowledge base of adversary tactics and
techniques, has been widely adopted by the cybersecurity industry as well as by academic …

An assistive tool for fileless malware detection

P Borana, V Sihag, G Choudhary… - 2021 World …, 2021 - ieeexplore.ieee.org
While fileless and file-based malware attacks are two completely different approaches, even
their assistance and detection tools vary. Fileless malware executes in a non-traditional way …

An efficient framework for securing the smart city communication networks

FA Alfouzan, K Kim, NM Alzahrani - Sensors, 2022 - mdpi.com
Recently, smart cities have increasingly been experiencing an evolution to improve the
lifestyle of citizens and society. These emerge from the innovation of information and …

[HTML][HTML] A taxonomy for threat actors' persistence techniques

A Villalón-Huerta, H Marco-Gisbert, I Ripoll-Ripoll - Computers & Security, 2022 - Elsevier
The main contribution of this paper is to provide an accurate taxonomy for Persistence
techniques, which allows the detection of novel techniques and the identification of …

Client-Based Web Attacks Detection Using Artificial Intelligence

J Hong, H Kim, S Oh, Y Im, H Jeong, H Kim, K Kim - 2023 - researchsquare.com
The prevalence of client-based web attacks, which exploit web vulnerabil-ities, has been
increasing with the growth of web sites. Although pattern detection has been widely used to …

Methodologies Based on Hardware Performance Counters for Supporting Cybersecurity

PP Pessoa, A do Monte, C Dantas… - … Challenges for Cyber …, 2023 - igi-global.com
Cybersecurity is a critical area of information technology, where prevention, detection, and
mitigation of cyberattacks are crucial to ensure system and data integrity. This chapter …