Malware Resistant Data Protection in Hyper-connected Networks: A survey

07/24/2023
by   Jannatul Ferdous, et al.
0

Data protection is the process of securing sensitive information from being corrupted, compromised, or lost. A hyperconnected network, on the other hand, is a computer networking trend in which communication occurs over a network. However, what about malware. Malware is malicious software meant to penetrate private data, threaten a computer system, or gain unauthorised network access without the users consent. Due to the increasing applications of computers and dependency on electronically saved private data, malware attacks on sensitive information have become a dangerous issue for individuals and organizations across the world. Hence, malware defense is critical for keeping our computer systems and data protected. Many recent survey articles have focused on either malware detection systems or single attacking strategies variously. To the best of our knowledge, no survey paper demonstrates malware attack patterns and defense strategies combinedly. Through this survey, this paper aims to address this issue by merging diverse malicious attack patterns and machine learning (ML) based detection models for modern and sophisticated malware. In doing so, we focus on the taxonomy of malware attack patterns based on four fundamental dimensions the primary goal of the attack, method of attack, targeted exposure and execution process, and types of malware that perform each attack. Detailed information on malware analysis approaches is also investigated. In addition, existing malware detection techniques employing feature extraction and ML algorithms are discussed extensively. Finally, it discusses research difficulties and unsolved problems, including future research directions.

READ FULL TEXT

page 10

page 12

research
05/15/2023

Survey of Malware Analysis through Control Flow Graph using Machine Learning

Malware is a significant threat to the security of computer systems and ...
research
08/10/2023

Analysis of the LockBit 3.0 and its infiltration into Advanced's infrastructure crippling NHS services

The LockBit 3.0 ransomware variant is arguably the most threatening of m...
research
05/24/2020

SoK: Arms Race in Adversarial Malware Detection

Malicious software (malware) is a major cyber threat that shall be tackl...
research
02/26/2020

Exploitation of Human Trust, Curiosity and Ignorance by Malware

Despite defensive advances in the Internet realm, Malware (malicious sof...
research
07/16/2023

CAPTCHA Types and Breaking Techniques: Design Issues, Challenges, and Future Research Directions

The proliferation of the Internet and mobile devices has resulted in mal...
research
11/03/2018

Malware Dynamic Analysis Evasion Techniques: A Survey

The Cyber world is plagued with ever-evolving malware that readily infil...
research
03/19/2016

A Survey of Stealth Malware: Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions

As our professional, social, and financial existences become increasingl...

Please sign up or login with your details

Forgot password? Click here to reset