SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 593
Impact of Malware in Modern Society
Vijayanand. C. D*, Arunlal. K. S**
*(Cyber Security Consulting System Engineer,Cisco Systems, UK.)
** (ASAP-Skill Development Executive, Quess Corp Limited, Bengaluru, India – 560103)
----------------------------------------************************----------------------------------
Abstract:
In today’s world most human carry at least one electronic computing device, which has a connection to the
internet. Internet starting to have influence in our everyday life. Other than computers and mobile devices,
traditionally standalone equipment and devices are too now connected to the internet to make them smart.
Critical infrastructure of cities, healthcare and other industries (SCADA) has been connected to internet to
make it smarter. Growth of internet helps to make human life easier to live. But at the same time malware
and cybercrime rate is also increasing along with that. In 2016, United States council of Economic
Advisers mentioned that the estimated cost of malware cost the U.S economy between $57 billion and
$109 billon [1]. In this paper work, we review most common types of malware in the internet, their impact
in our society, what are the motives to create a malware and the future.
Keywords —Bring Your Own Device (BYOD), Internet of Things (IoT), Malware, Cyber-attack,
Cyberspace, Cyberwarfare.
----------------------------------------************************----------------------------------
I. INTRODUCTION
Computer Software is a set of instructions for the
computer to perform a sequence of arithmetic or
logical operation. Electronic devices use software to
interact with humans. Computer software is broadly
categorised into system software and application
software. System software interacts between human
and computer hardware, its role as an interpreter
between human and computer hardware.
Application software runs on top of system
software, which provides a mean to use the
computer for different purpose. Software which are
programmed to cause damage to a computer, user
or whole system are called malicious software, also
called Malware.
It is estimated that in 1990 around 200 to 500
viruses were discovered or known to the industry,
then the number of viruses grew rapidly in few
years to 50,000 in the year 2000 [2]. In 2008, based
on BBC report the number of viruses grew to one
million [3]. It has now grown approximately over
1.7 billion [4]. It is difficult to put an exact count on
the number of actual viruses. Malware creators can
use different techniques (polymorphic and
metamorphic) in their code to appear a malware as
a new version. It is also true that the growth of
Internet is exponential since it 1990 after Tim
Berners-Lee’s invention of World Wide Web
(WWW). It is estimated that around 3 billion users
were using internet in 2016 [5] and the number is
growning. Now-a-day users are not only connecting
computers or mobiles devices, but any devices such
as electric blubs, cars, microwave ovens, kettles,
refrigerators, home security systems, fitness
wearables etc to create an Internet of “Internet of
Things” (IoT). As per IBM, IoT in nutshell “is the
concept of connecting any devices (so long as it has
an on/off switch) to the Internet” [6]. IoT has many
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 594
use cases in modern society for public safety,
precious agriculture, smart homes, water
distribution systems, smart meters, power grids etc.
The prediction of connected devices will reach 50
billion by 2020 [7]. The rapid growth of the
connected devices can raise serious thoughts on the
security side of the IoT and Internet.
II. TYPES OF MALWARES
Malware is an umbrella term used to represent
many forms of malicious software. Any software
purposefully design for bad intention can
categorised as a malware. Malwares aim is to harm
intentionally to the computing device and the user,
directly or in-directly. In a very high-level the
malwares are categorised based on their behaviour.
Commercial Anti-Virus (AV) and security vendors
have come up with lot of names for the malware
such as virus, worms, trojan horses, keyloggers,
dropper, scarewares, spammers, backdoors, rootkits,
spywares, adwares, ransomwares, scripts, macros
etc. With respect to AV engines, each engine uses
different naming format for the same virus. Though,
not all AV engine use the same method to detect the
virus infected files. Some AV engines scan for
strings in a file, whilst some use a combination of
string scanning and heuristics analysis. Irrespective
of scanning method, each AV engine vendor may
refer a virus in different naming format. From an
experimental test, it was clear that each vendor AV
engine use different naming format for the same
virus, there is no naming consistency in the industry
[8]. This inconsistency can create confusion for
users. To avoid confusion, this paper has used the
CARO (Computer Anti-virus Researchers
Organisation) malware naming scheme and
malware types. CARO naming scheme was created
in 1991 by a committee. The main purpose of the
organisation is to solve the confusion with virus
names. Major companies like Microsoft [9], Trend
Micro [10], Symantec etc follow CARO naming
format. Having said that, most malwares have
classified into more than one category.
Sophisticated malwares are a package of different
programs intent to perform together to achieve the
objective of the hakcer. Example: Trojan horse
malware cannot self-replicate, it has to combinate
with worm malware to achieve the spreading
objective.
Virus name is famous in IT industry and it is most
used name for almost all types of malicious code.
The name virus was first discussed at a security
seminar by Len Adleman in 3rd November 1983
[11]. Virus usually attach itself to a program or a
file. It has the capability to execute itself to inert its
own code by modify other programs in a computing
device. A virus program can copy itself and infect a
computer device without the permission or
knowledge of the user. Though it can self-execute,
but it needs human action to spread. If an infected
file or a program is installed or shared with a new
computer, the virus will automatically copy itself
into the new computer and execute its code. It
spread though infected files. Broadly, most virus
programs have two logical sections.One to create
copy of the virus file into one or more files on the
infected computer and the second part of the code is
to perform the malicious intention as per
programmed by the hacker. AV vendors have come
up with many methods to identify the evolving
malware industry. Other than traditional way to
using signatures to identify the malicious code, AV
companies are using behaviour monitoring,
heuristics, sandboxing, emulations and even using
Artificial Intelligence (AI).
Unlike virus, Worms have the capability to replicate
itself without human action from one computer
system to another. A worm does not need a host file,
it does not need to attach itself to another program
either to replicate. Some worms can scan the
network, collect the IP addresses and replicate to
the other computer using computer network. Some
use contact book and sends email with infected
worm file to them. CARO doesn’t consider worm
as a separate malware type and all worms are
considered as part of virus category [12].
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 595
Trojan horse is a famous historic tale when Greeks
built a large wooden horse and hide their army men
inside the horse to gain access inside the city of
Troy. Similarly, in cyberspace a malicious piece of
code can impostor and claim to be some legitimate
program, but in fact, it is a malware. It tricks the
user by misleading the real intent of the software.
Hence the name Trojan horse. Unlike Virus,
Trojans doesn’t have the capability of self-
replicating. Once it become active on a computer
system, an attacker can access and even control the
computer remotely.
Rootkits technically need not be malicious, it has
the capability to hide files and processes from other
processes, applications, AV engines, even from
own operating system. Commercial companies have
used rootkit to restrict user behaviour [13]. The
name implies, to have access at ‘root’ level of a
system with administration tools to perform the
admin tasks and the ‘kit’ word applies to the admin
tools, hence the name rootkit. It usually installs for
administration purpose on a system. The hackers
utilise the rootkits to gain remote access without the
information of the legitimate user of the system and
to avoid the detection. Once installed, the rootkit
malware can help to steal the data and resources
from infected system and hide undetected for years.
There are two main types of rootkits, they are
divided based on where they hide and run. User-
mode rootkits runs at ring 3 and kernel-mode
rootkits at ring 0. Rings are privilege mechanism
for the processes in x86 architecture [14].
Backdoors are closely related to rootkits. Unlike
rootkits which are used for administration purposes
on a system, backdoors are mainly a weakness in a
system. In general, backdoor provides a way for an
unauthorized user to gain access on a computer
system in a stealth way. If the rootkits are not well
protected (if they are installed for legitimate
administrative purpose) then it could lead to open
backdoor on the system. Thus, installing a rootkit
may allow unauthorized access into the system.
Backdoor as a malware, are very similar programs
like rootkit in which an attacker can trick a user to
install on his system. The main purpose of the
malware is to open a backdoor connection for the
hacker to access into a computer system remotely.
Depends on where the backdoor malicious program
installs, an attacked can gain user-level to root-level
privilege access on the system. Once the hacker
establishes a connection to the system via backdoor,
then the hacker can steal information, control the
system, modify the files, launch different forms of
attacks.
Millions of devices are connected to the internet,
some of the devices still have default username and
password (factory default) on the devices, which
can be easily compromised [15] and used as a bot.
Bots are devices which are part of a larger network
called Botnet, which is controlled remotely from a
centralized command and control (C2) centre. Some
botnet systems can obfuscate users to download
trojan horse by misleading as free legitimate
software, or as a phishing emails attachment or
using other tricks. Once the bot malware infected
and activated on a device, the malware will
establish a connection to the C2 centre, and the
device will become part of the botnet system. C2
centre has the control of the infected device and can
use it to generate Distributed Denial of Service
(DDoS) attack, steal sensitive information
(passwords, credit card numbers, key strokes,
propriety data), use computing resource for crypto
mining etc. It is estimated that the quarter of all
devices connected to the Internet are part of botnet
system [16]. “Botnet is an example of using good
technologies for bad intentions” - Symantec [17].
III. MALWARE ATTACKS
From 90’s Electronic mail (email) system to twenty
first centuries next generation of the Internet, and
with the rapid growth of IoT, billions of devices are
connected to the Internet. Every day more and more
devices are connecting to the Internet. With the
proliferation of IoT has revolutionised the public
services, healthcare, automated home, smart
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 596
personal equipment, industries, agriculture,
infrastructure, trade, communication, automobile
etc. Current society depends on critical
infrastructures and services enabled using latest
technologies. Traditional cooperate way of working
from office premises is changing too. Most
cooperates embracing Bring Your Own Device
(BYOD) and Cloud based applications. On-
premises datacentres are moving towards Cloud. In
2018, Cloud services provider market reached
$186.4 billion with a growth rate of 21.4% year-on-
year [18]. Cloud based applications provide
flexibility for employees to work remotely from
anywhere (home, airport, coffee shop) and access to
the official data anytime. This luxury of flexibility
comes with new attack surface as well. Many
researches have been carried out to understand the
threats associated with cloud services such as
visibility and remediation of vulnerabilities, data
integrity, authentication weakness, risk mitigation
measurements, events and incidence management,
data privacy and confidentiality in a highly
virtualised and multi-tenant environment [19].
Cloud security is another topic which falls out of
the scope for this paper. But it is worth noting that
any form of cyber-attack can have impact on the
business and economic stability. And from the past
incidences, it is clear that the data security breaches
on confidential and sensitive information can
negatively impact the stock market [20].
Broadband (Internet connection) is a common
utility like electricity or water supply in every
house in a modern society. Home equipment’s with
internet connection provides smart features than
their standalone version. Smart Home concept is
growing rapidly. As per IDC, smart home devices
are expected to grow 26.9% year-over-year and as
estimated shipment of 832.7 million devices in
2019 [21]. Unlike corporate offices where dedicated
security professionals and security products have
been deployed to defend the network, home
networks usually don’t have this luxury of layered
defenced approach nor support from a security
expert to defend any form of malicious attack.
Hackers can easily exploit this weakness to launch
the attack. In 2018, a malware name VPNfilter
reported by Cisco TALOS which is designed to
target home routers [22]. The malware is capable of
maintaining a persistent presence on an infected
router even after a reboot. Other than other
malicious capabilities, the malware can perform
man-in-the-middle (MitM) attack, sniffing all
traffic transmitting through the router. It is designed
to intercept the web traffic and negotiate to the end
device to downgrade the SSL/TLS encryption to
plaintext HTTP traffic. Plain text traffic is easy to
manipulate and read. As per Symantec, it is
estimated that the malware infected half a million
routers in more than 50 countries [23].
A variant of malware which encrypts the Master
Boot Record (MBR), Hard disk, erase files of
windows operating system. Some version of the
malware may encrypt only the MBR while other
encrypts the hard disk, some may encrypt both
Hardware and MBR. Irrespective of the encryption
style, the key to decrypt needs to buy paying in
bitcoins (Crypto currency) to the hacker. Hence the
name Ransomware. There are few flavours of
ransomware attack in 2017. The main ransomware
malwares are WannaCry, Petya and NotPetya
(NotPetya is also known as PetrWarp, GoldenEye,
Petya.A, Petya.C, PetyaCry, Nyetya). WannaCry’s
attack vector was using a hacking tool named
EternalBlue which exploits SMB protocol.
Healthcare industry become one of the main
victims of the WannaCry malware. The attack
impacted around 60 National Health Service (NHS)
hospitals, 595 general practices (GPs) systems and
thousands of patients. Attack on the NHS computer
systems led to a minimum of 7000 outpatient
appointments had to cancel. The impact had
reached even to the critical healthcare service
department too, urgent cancer referral was delayed
for 139 patients [24]. WannaCry, which had a kill
switch of verifying whether a gibberish URL is
active or not. Once the URL is active the
ransomware becomes inactive and shutdown. This
helps to mitigate the spreading of WannaCry.
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 597
Initially, malware Petya used email attachments
(Phishing attack) as the attack vector, later a variant
of malware Petya use EternalBlue and
EternalRomance hacking tools as the attack vector
and is known as NotPetya. NotPetya use Mimikatz
tool as a dropper to steal the administrator password
from the memory on a compromised system. It was
built to spread more quickly and doesn’t have a
similar kill switch inbuilt into the malware code
like WannaCry. May be the malware creators might
have learned their lessons from WannaCry. One of
the main victims of NotPetya was Shipping
industry. Maersk shipping company had impacted
the NotPetya malware forced to lock down their
entire global IT system for few days. The shipping
company have presence all over the world. Maersk
is responsible for 76 shipping ports spread across
the globe including container ships with tens of
millions of tons of cargo shipmentswhich is equal
to a fifth of the entire world’s shipping capacity,
locked down in the sea for days due to malware
attack [25].
In Oct 2018, The Cybersecurity and Infrastructure
Security Agency (CISA) part of Department of
Homeland security (DHS) in United State of
America, released a report on cybersecurity threats
to precision agriculture [26]. DHS report warned
about the impact on Confidentiality, Integrity and
Availability (CIA) of data. Agriculture industry
have adopted latest and advanced technologies such
as remote sensors, equipment automation, global
positions systems (GPS), location tracking systems,
robotics, machine learning, edge computing and
other communication network systems to decrease
the operations cost and to increase the productivity
of the farming. Agriculture not only a private
business of an individual farmer, it is vitally
important to the nation’s overall economic and food
security. The farmer community supplies food for
the entire nation and also provides economic
exports globally. Cyber-attack on the agriculture
sector can have impact on the economy of a nation.
SCADA systems are used to control and monitor
critical infrastructure of a state or nation, such as
electricity distribution, transportation of gas, oil
pipelines, water management and distribution,
traffic lights and other systems in a modern society.
There are known incidents recorded in RISI
database which covers from trojan attack on
Siberian Gas Pipeline explosion in 1982 to German
steel mill cyber-attack in 2015. Advanced social
engineering used as the attack vector to gain access
in the German steel mill network which led to the
malfunction of the furnace. Stuxnet is a famous
worm had stuck the Iranian nuclear facility at
Natanz in 2010, which consider as one of the most
complex malwares. The Stuxnet malware was
designed specifically to exploit the Siemens
systems and frequency-converter drives used to
power the centrifuges made by Fararo Paya in Iran
and Vacon in Finland. Malware Duqu and Flame
are very similar to Stuxnet malware which are also
developed as a Cyberweapon for the disruption of
critical infrastructure [27]. In 2016, Mirai malware,
a cyberweapon,used IoT devices to create a large
botnet system name Mirai was successful in bring
down OVH cloud service provider by launching 1.1
Tbps DDoS attack [28]. The attack is considered as
one of the largest DDoS attacks till today.
IV. MOTIVATION
Today’s modern society is a massive
sociotechnical system. Researchers have
highlighted that cyber-attacks are indeed associated
with social, political, economic and cultural (SPEC)
conflicts [29]. Most countries are investing in
technologically advanced infrastructure [30]. The
critical infrastructures are the backbone of a state or
a nation. It is crucial to protect during times of
political conflicts and social instability. Motivation
for political led cyberattacks are mostly to spread
propaganda, protest against political actions, protest
again certain laws, outrage against acts related to
government or related organization’s physical
violence to the general public. In 2016, Russia’s
involvement in U. S presidential election was a
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 598
politically motivated attack. US Democratic
National committee (DNC) candidate’s private
email server had been compromised. The emails
were stolen and published in Wikileaks website.
DNC blames Russia is responsible for the cyber-
attack to influence the presidential election. Russia
is blamed for 2007’s DDoS attack on Estonian
government and commercial websites which lasted
for days. The attack impacted Estonian banks, new
agencies, ministries, newspapers and broadcasters
and government website [31]. The motivation for
the attack was related to cultural and political
conflict of interest. The attack originated from the
disagreement between Estonian government and
Russia about the relocation of the Bronze Soldier of
Tallinn grave. Socio-cultural conflicts can also
motivate cyberwar, Twain and China in 1999,
Russia and Georgia in 2008, Ongoing Israel and
Palestine are examples of socio-cultural triggered
cyber-attacks [32].
Other than for fun and curiosity, one other main
motivation for a cyber-attack is personal or
corporate financial greed. Economically motivated
attacks are usually done by cyber mercenaries,
cyber criminals, organized cartels. In 2009,
personal economic situations have led individuals
to choose cybercrime industry. Due to economic
meltdown in IT sector in China, many lost their job
and turned to cybercrime activity for economical
reason [33]. Recently Amazon.com Inc become
victim of cyber-attack, around hundred seller
accounts have been compromised and stolen the
money from these accounts [34].
V. CONCLUSION
Cyber-attacks can cause significant loss of business
intelligence and intellectual property, damage brand
reputation, loss of money. As the number and
evolving technical complexity of the malware is
increasing day by day, current malware detecting
mechanisms is not providing enough capabilities to
keep the hackers out of the system. Moreover, the
upsurge of cyber CaaS (Crime as a Service)
business in dark web, even less skilled cyber-
criminals can buy malware bundles to launch
sophisticated attacks and the shift of cyberspace
into cyberwarfare. It is clear that the cyberspace is
an arm race, with one side contributing to the
betterment of human life and the other side is a
growing threat for the world.
VI. FUTURE SCOPE
As the Internet and the smart devices are more
deeply penetrate our lives, we at personal level
starting to face new privacy and security
vulnerabilities. With the revolution of IoT,
everything ties together from cars, our homes,
phones, traffic navigation, entertainment, to our
medical devices through the Internet. Cyber
security become one of the critical elements in
today world. As per the evolving risks landscape
2009-2019 report of the world economic forum,
cyber-attack is ranked among third in 2018 and fifth
in 2019 report.
There is a saying “a chain is only as strong as its
weakest link” and it apply to the cyber security as
well. Malware is constantly evolving to adapt to the
changing modern technology. The new variants are
more and more sophisticated, designed to exploit
zero-day vulnerabilities, penetrate most security
devices and avoid detection. Malwares already
using techniques like polymorphic and
metamorphic to change their code as they propagate
to avoid detection. Advanced Persistence Threat
(APT) is another method of cyber-attack, use
sophisticated hacking techniques to gain access to a
system and remain undetected inside the system for
a prolonged period of time.
Cyber threats are getting more advanced with
upsurge of highly skilled hackers and the nation-
state sponsorship, led to the development of
sophisticated hacking tools. In 2018, 12th
May the
WannaCry ransomware attack on UK’s NHS costs
billions of pounds to repair the damage and the
26th
May, the NotPetya malware caused damage of
billions of dollars to fix. Researchers believe that
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 599
the WannaCry is from North Korea and NotPetya is
from Russia. But the underline hacking tool which
used for both the cyber-attacks was developed by
CIA as a cyberweapon. Nation-states are
considering cyber-as-a-weapon, and some nations
are already preparing for cyberwarfare. Similar to
regular military exercises, Cybersecurity and
Infrastructure Security Agency (CISA) conducts
national-level cyber exercise called Cyber Storm
[35], that simulates coordinated cyber-attack at
large-scale impacting the U.S critical infrastructure.
The exercise includes employees from private
industry, federal government agencies and
international partners. As the modern society
becomes more and more digitally interconnected,
maintaining cybersecurity will become more
difficult. As per the world economic forum,
“Cyberspace has become a fifth dimension of
warfare” other than land, sea, air and space. Hence
it is critical for countries to prepare and defend
from related cyberwar. Cyberwar is not new, it has
been going on over a decade, using different
methods such as data leaking, DDoS, website attack.
But the impact of the cyber-attacks from damaging
a file on a personal computer to destabilising a
corporate business overnight has now shifted to
having an impact on global political and economic
system. National level cyberwarfare can have more
severer consequences than hacking corporate emails
or leaking data. Cyberwarfare can result in pipeline
gas explosion, nuclear reactor malfunction, power
grid shutdown and weapon system sabotage. It was
reported that Chinese government hackers had
stolen 614 Gbs of data from a U.S Navy contractor
[36]. Same year China-linked spy group named
APT15 was involved in an attack aimed to an
organisation that provides services to U.K
government. The attack was targeted to U.K
government departments and military technology
[37].
In this digital age, some countries are considering
retaliation with military option as a response for the
cyber-attack on their nation. In 2019, Israeli
DefenseForce claimed that they responded Hamas
cyber-attack with military operation. The main
concern with cyberwar is that it is still enormously
complex, need new international laws and
framework. With the growing concerns over the
cyberwarfare, Microsoft came out with a petition to
demand “Digital Peace Now” [38] to highlight the
devastating consequences of Cyberwar that could
impact the future of human, and this issue must not
be ignored.
REFERENCES
[1] T. C. o. E. Advisers, “The Cost of Malicious Cyber Activity to the U.S.
Economy,” Feb 2018. [Online]. Available:
https://www.whitehouse.gov/wp-content/uploads/2018/03/The-Cost-
of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf.
[2] DaBoss, “Number of Viruses,” 28 Feb 2013. [Online]. Available:
https://www.cknow.com/cms/vtutor/number-of-viruses.html.
[3] “Computer viruses hit one million,” 10 Apr 2008. [Online]. Available:
http://news.bbc.co.uk/2/hi/technology/7340315.stm.
[4] I. M. Bushra A Al Ahmadi, “Mal Classifier: Malware family
classification using network flow sequence behavior,” 2018. [Online].
Available: https://ieeexplore.ieee.org/abstract/document/8376209.
[5] M. R. Julia Murphy, “Growth of the Internet,” [Online]. Available:
https://ourworldindata.org/internet.
[6] J. Clark, “What is the Internet Of things?” 17 Nov 2016. [Online].
Available: https://www.ibm.com/blogs/internet-of-things/what-is-the-
iot/.
[7] W. E. Forum, “Is this the future of the Internet of Things?” 27 Nov
2015. [Online]. Available:
https://www.weforum.org/agenda/2015/11/is-this-future-of-the-
internet-of-things/.
[8] J. Mo, “What Can We Learn from Anti-malware Naming Conventions?”
05 Nov 2015. [Online]. Available: https://www.opswat.com/blog/what-
can-we-learn-anti-malware-naming-conventions.
[9] “Malware names,” Microsoft, 04 Aug 2019. [Online]. Available:
https://docs.microsoft.com/en-us/windows/security/threat-
protection/intelligence/malware-naming.
[10] “New Threat Detection Naming Scheme in Trend Micro,” 28 Apr 2019.
[Online]. Available: https://success.trendmicro.com/solution/1119738-
new-threat-detection-naming-scheme-in-trend-micro.
[11] F. Cohen, “Experiments with Computer Viruses,” [Online]. Available:
http://www.all.net/books/virus/part5.html.
[12] Dr. Vesselin Bontchev, “Current Status of the CARO Malware Naming
Scheme,” [Online]. Available:
https://bontchev.nlcv.bas.bg/papers/pdfs/caroname.pdf.
[13] “Revisiting the Sony Rootkit,” [Online]. Available:
https://fsfe.org/activities/drm/sony-rootkit-fiasco.en.html.
[14] C. S. B. B. K. Hojoon Lee, “Lord of the x86 Rings: A Portable User
Mode Privilege Separation Architecture on x86,” [Online]. Available:
https://arxiv.org/pdf/1805.11912.pdf.
[15] A. S. A. Mohammed Farik, “Analysis of Default Passwords In Routers
Against Brute-Force Attack,” 09 Sep 2015. [Online]. Available:
http://www.ijstr.org/final-print/sep2015/Analysis-Of-Default-
Passwords-In-Routers-Against-Brute-force-Attack.pdf.
[16] J. M. F. M. D. L. C. J. Basil AsSadhan, “Detecting Botnets using
Command and Control Traffic,” [Online]. Available:
https://ieeexplore.ieee.org/abstract/document/5190367.
[17] S. Employee, “What is a botnet?” [Online]. Available:
https://us.norton.com/internetsecurity-malware-what-is-a-botnet.html.
International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 600
[18] B.-Y. K. Seok-Keun Yoo, “The Effective Factors of Cloud Computing
Adoption Success in Organization,” The Journal of Asian Finance,
Economics and Business, vol. 6, 2018.
[19] A. K. M. A. Issa M Khalil, “Cloud Computing Security: A Survey,”
MDPI, vol. 3, 2014.
[20] L. A. G. M. P. L. L. Z. Katherine Campbell, “The economic cost of
publicly announced information security breaches: empirical evidence
from the stock market,” 1 Jul 2003. [Online]. Available:
https://content.iospress.com/articles/journal-of-computer-
security/jcs192.
[21] R. L. M. S. Jitesh Ubrani, “Double-Digit Growth Expected in the
Smart Home Market, Says IDC,” 29 Mar 2019. [Online]. Available:
https://www.idc.com/getdoc.jsp?containerId=prUS44971219.
[22] C. TALOS, “VPNFilter,” 06 June 2018. [Online]. Available:
https://blog.talosintelligence.com/2018/06/vpnfilter-update.html.
[23] Symantec, “VPNFilter malware now targeting even more router brands.
How to check if you're affected.,” 29 June 2018. [Online]. Available:
https://us.norton.com/internetsecurity-emerging-threats-vpnfilter-
malware-targets-over-500000-routers.html.
[24] S. G. J. K. C. H. A. D. Guy Martin, “WannaCry—a year on,” 04 Jun
2018. [Online]. Available:
https://www.bmj.com/content/361/bmj.k2381.full.
[25] D. Herbener, “The Economics of Cybersecurity and Cyberwarfare: A
Case Study,” 05 Dec 2018. [Online]. Available:
http://austrianstudentconference.com/wp-
content/uploads/2019/02/ASSC-2019-Lorenzo-Carrazana.pdf.
[26] C. a. I. S. Agency, “Cybersecurity Threats to Precision Agriculture,”
03 Oct 2018. [Online]. Available: https://www.us-
cert.gov/ncas/current-activity/2018/10/03/Cybersecurity-Threats-
Precision-Agriculture.
[27] D. C. R. Bill Miller, “A Survey of SCADA and Critical Infrastructure
Incidents,” [Online]. Available:
https://www.researchgate.net/profile/Bill_Miller5/publication/2623155
94_A_survey_SCADA_of_and_critical_infrastructure_incidents/links/
551ab10f0cf2fdce843695f4.pdf.
[28] C. Kolias, G. Kambourakis, A. Stavrou and J. V. Vi, “DDoS in the IoT:
Mirai and Other Botnets,” [Online]. Available:
https://ieeexplore.ieee.org/abstract/document/7971869.
[29] A. S,. W. M. W. S. Q. Z. P. L. Robin Gandhi, “Dimensions of Cyber-
Attacks: Cultural, Social, Economic, and Political,” [Online]. Available:
https://ieeexplore.ieee.org/abstract/document/5725605.
[30] C. Heathcote, “Forecasting infrastructure investment needs for 50
countries, 7 sectors through 2040,” 10 Aug 2017. [Online]. Available:
https://blogs.worldbank.org/ppps/forecasting-infrastructure-
investment-needs-50-countries-7-sectors-through-2040.
[31] “The 2007 Estonian Cyberattacks: New Frontiers in International
Conflict,” 21 Dec 2012. [Online]. Available:
http://blogs.harvard.edu/cyberwar43z/2012/12/21/estonia-ddos-
attackrussian-nationalism/.
[32] A. S. W. M. W. S. Q. Z. P. L. Robin Gandhi, “Dimensions of Cyber-
Attacks: Cultural, Social, Economic, and Political,” [Online]. Available:
https://ieeexplore.ieee.org/document/5725605.
[33] R. McMillan, “China becoming the world's malware factory,” 24 Mar
2009. [Online]. Available:
https://www.networkworld.com/article/2265827/china-becoming-the-
world-s-malware-factory.html.
[34] J. Browning, “Amazon Hit by Extensive Fraud with Hackers Siphoning
Merchant Funds,” 8 May 2019. [Online]. Available:
https://www.bloomberg.com/news/articles/2019-05-08/amazon-hit-by-
extensive-fraud-as-hackers-siphoned-merchant-funds.
[35] “Cyber Storm VI: National Cyber Exercise,” [Online]. Available:
https://www.dhs.gov/cisa/cyber-storm-vi.
[36] “Chinese Government Hackers Steal Trove of U.S. Navy Data: Report,”
08 Jun 2018. [Online]. Available:
https://www.securityweek.com/chinese-government-hackers-steal-
trove-us-navy-data-report.
[37] “China-Linked Spies Used New Malware in U.K. Government Attack,”
12 March 2018. [Online]. Available:
https://www.securityweek.com/china-linked-spies-used-new-malware-
uk-government-attack.
[38] “Microsoft Digital Peace Now,” [Online]. Available:
https://digitalpeace.microsoft.com/know-the-issue/.

More Related Content

What's hot

Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0mobileironmarketing
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0varun4110
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelIRJET Journal
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking IJECEIAES
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploitsecarrow
 
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree ModelingDesigning Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modelingijtsrd
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? CypSec - Siber Güvenlik Konferansı
 
Commercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks MalwareCommercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks MalwareAditya K Sood
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systemsSejahtera Affif
 
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayadaKnown Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayadanamblasec
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
Viruses ppt finale
Viruses ppt  finaleViruses ppt  finale
Viruses ppt finalemishrasb4
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresIOSR Journals
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackCSCJournals
 
21 zen vol2_issue2_feb12
21 zen vol2_issue2_feb1221 zen vol2_issue2_feb12
21 zen vol2_issue2_feb12Dr. Geetha R
 

What's hot (20)

Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
MainPaper_4.0
MainPaper_4.0MainPaper_4.0
MainPaper_4.0
 
Contending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security ModelContending Malware Threat using Hybrid Security Model
Contending Malware Threat using Hybrid Security Model
 
Ransomware protection in loT using software defined networking
Ransomware protection in loT using software  defined networking  Ransomware protection in loT using software  defined networking
Ransomware protection in loT using software defined networking
 
Mobile Application Security
Mobile Application Security Mobile Application Security
Mobile Application Security
 
Puppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability ExploitsPuppetnets and Botnets: Information Technology Vulnerability Exploits
Puppetnets and Botnets: Information Technology Vulnerability Exploits
 
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree ModelingDesigning Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
 
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi? Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
Adil Burak Sadıç - Siber Güvenlik mi, Bilgi Güvenliği mi, BT Güvenliği mi?
 
Commercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks MalwareCommercial Cyber Crime - Social Networks Malware
Commercial Cyber Crime - Social Networks Malware
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
 
188
188188
188
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayadaKnown Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
Known Knowns, Unknown Unknowns and Anti Virus stuff yadayadayada
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
Mobile Malware
Mobile MalwareMobile Malware
Mobile Malware
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Viruses ppt finale
Viruses ppt  finaleViruses ppt  finale
Viruses ppt finale
 
Survey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive MeasuresSurvey of different Web Application Attacks & Its Preventive Measures
Survey of different Web Application Attacks & Its Preventive Measures
 
A Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits AttackA Mitigation Technique For Internet Security Threat of Toolkits Attack
A Mitigation Technique For Internet Security Threat of Toolkits Attack
 
21 zen vol2_issue2_feb12
21 zen vol2_issue2_feb1221 zen vol2_issue2_feb12
21 zen vol2_issue2_feb12
 

Similar to IJSRED-V2I3P69

A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityIRJET Journal
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet IJECEIAES
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET Journal
 
Survey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetijctet
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Educationijtsrd
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...IJERA Editor
 
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3IJERA Editor
 
Ceis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperCeis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperAlexander Decker
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareIRJET Journal
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...IRJET Journal
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...IRJET Journal
 

Similar to IJSRED-V2I3P69 (20)

A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet Invesitigation of Malware and Forensic Tools on Internet
Invesitigation of Malware and Forensic Tools on Internet
 
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Survey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manetSurvey of apt and other attacks with reliable security schemes in manet
Survey of apt and other attacks with reliable security schemes in manet
 
A Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity EducationA Survey of Keylogger in Cybersecurity Education
A Survey of Keylogger in Cybersecurity Education
 
185
185185
185
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
Client Honeypot Based Drive by Download Exploit Detection and their Categoriz...
 
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
Exploring the Social Engineering Toolkit (Set) Using Backtrack 5R3
 
Ceis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paperCeis 9 padeep kumar_final_paper
Ceis 9 padeep kumar_final_paper
 
Malware
MalwareMalware
Malware
 
A Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile MalwareA Study on Modern Methods for Detecting Mobile Malware
A Study on Modern Methods for Detecting Mobile Malware
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
E04 05 2841
E04 05 2841E04 05 2841
E04 05 2841
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
 
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
Effects of Backdoor Awareness on Cyber Hygiene Culture of Nigeria’s Civil Ser...
 

More from IJSRED

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security SystemIJSRED
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityIJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseIJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesIJSRED
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by FranceIJSRED
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition SystemIJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPIJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. AmaraIJSRED
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsIJSRED
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cartIJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...IJSRED
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen ManagementIJSRED
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsIJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionIJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...IJSRED
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemIJSRED
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistantIJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaIJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....IJSRED
 

More from IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Recently uploaded

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptxNikhil Raut
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 

Recently uploaded (20)

Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptx
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 

IJSRED-V2I3P69

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 593 Impact of Malware in Modern Society Vijayanand. C. D*, Arunlal. K. S** *(Cyber Security Consulting System Engineer,Cisco Systems, UK.) ** (ASAP-Skill Development Executive, Quess Corp Limited, Bengaluru, India – 560103) ----------------------------------------************************---------------------------------- Abstract: In today’s world most human carry at least one electronic computing device, which has a connection to the internet. Internet starting to have influence in our everyday life. Other than computers and mobile devices, traditionally standalone equipment and devices are too now connected to the internet to make them smart. Critical infrastructure of cities, healthcare and other industries (SCADA) has been connected to internet to make it smarter. Growth of internet helps to make human life easier to live. But at the same time malware and cybercrime rate is also increasing along with that. In 2016, United States council of Economic Advisers mentioned that the estimated cost of malware cost the U.S economy between $57 billion and $109 billon [1]. In this paper work, we review most common types of malware in the internet, their impact in our society, what are the motives to create a malware and the future. Keywords —Bring Your Own Device (BYOD), Internet of Things (IoT), Malware, Cyber-attack, Cyberspace, Cyberwarfare. ----------------------------------------************************---------------------------------- I. INTRODUCTION Computer Software is a set of instructions for the computer to perform a sequence of arithmetic or logical operation. Electronic devices use software to interact with humans. Computer software is broadly categorised into system software and application software. System software interacts between human and computer hardware, its role as an interpreter between human and computer hardware. Application software runs on top of system software, which provides a mean to use the computer for different purpose. Software which are programmed to cause damage to a computer, user or whole system are called malicious software, also called Malware. It is estimated that in 1990 around 200 to 500 viruses were discovered or known to the industry, then the number of viruses grew rapidly in few years to 50,000 in the year 2000 [2]. In 2008, based on BBC report the number of viruses grew to one million [3]. It has now grown approximately over 1.7 billion [4]. It is difficult to put an exact count on the number of actual viruses. Malware creators can use different techniques (polymorphic and metamorphic) in their code to appear a malware as a new version. It is also true that the growth of Internet is exponential since it 1990 after Tim Berners-Lee’s invention of World Wide Web (WWW). It is estimated that around 3 billion users were using internet in 2016 [5] and the number is growning. Now-a-day users are not only connecting computers or mobiles devices, but any devices such as electric blubs, cars, microwave ovens, kettles, refrigerators, home security systems, fitness wearables etc to create an Internet of “Internet of Things” (IoT). As per IBM, IoT in nutshell “is the concept of connecting any devices (so long as it has an on/off switch) to the Internet” [6]. IoT has many RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 594 use cases in modern society for public safety, precious agriculture, smart homes, water distribution systems, smart meters, power grids etc. The prediction of connected devices will reach 50 billion by 2020 [7]. The rapid growth of the connected devices can raise serious thoughts on the security side of the IoT and Internet. II. TYPES OF MALWARES Malware is an umbrella term used to represent many forms of malicious software. Any software purposefully design for bad intention can categorised as a malware. Malwares aim is to harm intentionally to the computing device and the user, directly or in-directly. In a very high-level the malwares are categorised based on their behaviour. Commercial Anti-Virus (AV) and security vendors have come up with lot of names for the malware such as virus, worms, trojan horses, keyloggers, dropper, scarewares, spammers, backdoors, rootkits, spywares, adwares, ransomwares, scripts, macros etc. With respect to AV engines, each engine uses different naming format for the same virus. Though, not all AV engine use the same method to detect the virus infected files. Some AV engines scan for strings in a file, whilst some use a combination of string scanning and heuristics analysis. Irrespective of scanning method, each AV engine vendor may refer a virus in different naming format. From an experimental test, it was clear that each vendor AV engine use different naming format for the same virus, there is no naming consistency in the industry [8]. This inconsistency can create confusion for users. To avoid confusion, this paper has used the CARO (Computer Anti-virus Researchers Organisation) malware naming scheme and malware types. CARO naming scheme was created in 1991 by a committee. The main purpose of the organisation is to solve the confusion with virus names. Major companies like Microsoft [9], Trend Micro [10], Symantec etc follow CARO naming format. Having said that, most malwares have classified into more than one category. Sophisticated malwares are a package of different programs intent to perform together to achieve the objective of the hakcer. Example: Trojan horse malware cannot self-replicate, it has to combinate with worm malware to achieve the spreading objective. Virus name is famous in IT industry and it is most used name for almost all types of malicious code. The name virus was first discussed at a security seminar by Len Adleman in 3rd November 1983 [11]. Virus usually attach itself to a program or a file. It has the capability to execute itself to inert its own code by modify other programs in a computing device. A virus program can copy itself and infect a computer device without the permission or knowledge of the user. Though it can self-execute, but it needs human action to spread. If an infected file or a program is installed or shared with a new computer, the virus will automatically copy itself into the new computer and execute its code. It spread though infected files. Broadly, most virus programs have two logical sections.One to create copy of the virus file into one or more files on the infected computer and the second part of the code is to perform the malicious intention as per programmed by the hacker. AV vendors have come up with many methods to identify the evolving malware industry. Other than traditional way to using signatures to identify the malicious code, AV companies are using behaviour monitoring, heuristics, sandboxing, emulations and even using Artificial Intelligence (AI). Unlike virus, Worms have the capability to replicate itself without human action from one computer system to another. A worm does not need a host file, it does not need to attach itself to another program either to replicate. Some worms can scan the network, collect the IP addresses and replicate to the other computer using computer network. Some use contact book and sends email with infected worm file to them. CARO doesn’t consider worm as a separate malware type and all worms are considered as part of virus category [12].
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 595 Trojan horse is a famous historic tale when Greeks built a large wooden horse and hide their army men inside the horse to gain access inside the city of Troy. Similarly, in cyberspace a malicious piece of code can impostor and claim to be some legitimate program, but in fact, it is a malware. It tricks the user by misleading the real intent of the software. Hence the name Trojan horse. Unlike Virus, Trojans doesn’t have the capability of self- replicating. Once it become active on a computer system, an attacker can access and even control the computer remotely. Rootkits technically need not be malicious, it has the capability to hide files and processes from other processes, applications, AV engines, even from own operating system. Commercial companies have used rootkit to restrict user behaviour [13]. The name implies, to have access at ‘root’ level of a system with administration tools to perform the admin tasks and the ‘kit’ word applies to the admin tools, hence the name rootkit. It usually installs for administration purpose on a system. The hackers utilise the rootkits to gain remote access without the information of the legitimate user of the system and to avoid the detection. Once installed, the rootkit malware can help to steal the data and resources from infected system and hide undetected for years. There are two main types of rootkits, they are divided based on where they hide and run. User- mode rootkits runs at ring 3 and kernel-mode rootkits at ring 0. Rings are privilege mechanism for the processes in x86 architecture [14]. Backdoors are closely related to rootkits. Unlike rootkits which are used for administration purposes on a system, backdoors are mainly a weakness in a system. In general, backdoor provides a way for an unauthorized user to gain access on a computer system in a stealth way. If the rootkits are not well protected (if they are installed for legitimate administrative purpose) then it could lead to open backdoor on the system. Thus, installing a rootkit may allow unauthorized access into the system. Backdoor as a malware, are very similar programs like rootkit in which an attacker can trick a user to install on his system. The main purpose of the malware is to open a backdoor connection for the hacker to access into a computer system remotely. Depends on where the backdoor malicious program installs, an attacked can gain user-level to root-level privilege access on the system. Once the hacker establishes a connection to the system via backdoor, then the hacker can steal information, control the system, modify the files, launch different forms of attacks. Millions of devices are connected to the internet, some of the devices still have default username and password (factory default) on the devices, which can be easily compromised [15] and used as a bot. Bots are devices which are part of a larger network called Botnet, which is controlled remotely from a centralized command and control (C2) centre. Some botnet systems can obfuscate users to download trojan horse by misleading as free legitimate software, or as a phishing emails attachment or using other tricks. Once the bot malware infected and activated on a device, the malware will establish a connection to the C2 centre, and the device will become part of the botnet system. C2 centre has the control of the infected device and can use it to generate Distributed Denial of Service (DDoS) attack, steal sensitive information (passwords, credit card numbers, key strokes, propriety data), use computing resource for crypto mining etc. It is estimated that the quarter of all devices connected to the Internet are part of botnet system [16]. “Botnet is an example of using good technologies for bad intentions” - Symantec [17]. III. MALWARE ATTACKS From 90’s Electronic mail (email) system to twenty first centuries next generation of the Internet, and with the rapid growth of IoT, billions of devices are connected to the Internet. Every day more and more devices are connecting to the Internet. With the proliferation of IoT has revolutionised the public services, healthcare, automated home, smart
  • 4. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 596 personal equipment, industries, agriculture, infrastructure, trade, communication, automobile etc. Current society depends on critical infrastructures and services enabled using latest technologies. Traditional cooperate way of working from office premises is changing too. Most cooperates embracing Bring Your Own Device (BYOD) and Cloud based applications. On- premises datacentres are moving towards Cloud. In 2018, Cloud services provider market reached $186.4 billion with a growth rate of 21.4% year-on- year [18]. Cloud based applications provide flexibility for employees to work remotely from anywhere (home, airport, coffee shop) and access to the official data anytime. This luxury of flexibility comes with new attack surface as well. Many researches have been carried out to understand the threats associated with cloud services such as visibility and remediation of vulnerabilities, data integrity, authentication weakness, risk mitigation measurements, events and incidence management, data privacy and confidentiality in a highly virtualised and multi-tenant environment [19]. Cloud security is another topic which falls out of the scope for this paper. But it is worth noting that any form of cyber-attack can have impact on the business and economic stability. And from the past incidences, it is clear that the data security breaches on confidential and sensitive information can negatively impact the stock market [20]. Broadband (Internet connection) is a common utility like electricity or water supply in every house in a modern society. Home equipment’s with internet connection provides smart features than their standalone version. Smart Home concept is growing rapidly. As per IDC, smart home devices are expected to grow 26.9% year-over-year and as estimated shipment of 832.7 million devices in 2019 [21]. Unlike corporate offices where dedicated security professionals and security products have been deployed to defend the network, home networks usually don’t have this luxury of layered defenced approach nor support from a security expert to defend any form of malicious attack. Hackers can easily exploit this weakness to launch the attack. In 2018, a malware name VPNfilter reported by Cisco TALOS which is designed to target home routers [22]. The malware is capable of maintaining a persistent presence on an infected router even after a reboot. Other than other malicious capabilities, the malware can perform man-in-the-middle (MitM) attack, sniffing all traffic transmitting through the router. It is designed to intercept the web traffic and negotiate to the end device to downgrade the SSL/TLS encryption to plaintext HTTP traffic. Plain text traffic is easy to manipulate and read. As per Symantec, it is estimated that the malware infected half a million routers in more than 50 countries [23]. A variant of malware which encrypts the Master Boot Record (MBR), Hard disk, erase files of windows operating system. Some version of the malware may encrypt only the MBR while other encrypts the hard disk, some may encrypt both Hardware and MBR. Irrespective of the encryption style, the key to decrypt needs to buy paying in bitcoins (Crypto currency) to the hacker. Hence the name Ransomware. There are few flavours of ransomware attack in 2017. The main ransomware malwares are WannaCry, Petya and NotPetya (NotPetya is also known as PetrWarp, GoldenEye, Petya.A, Petya.C, PetyaCry, Nyetya). WannaCry’s attack vector was using a hacking tool named EternalBlue which exploits SMB protocol. Healthcare industry become one of the main victims of the WannaCry malware. The attack impacted around 60 National Health Service (NHS) hospitals, 595 general practices (GPs) systems and thousands of patients. Attack on the NHS computer systems led to a minimum of 7000 outpatient appointments had to cancel. The impact had reached even to the critical healthcare service department too, urgent cancer referral was delayed for 139 patients [24]. WannaCry, which had a kill switch of verifying whether a gibberish URL is active or not. Once the URL is active the ransomware becomes inactive and shutdown. This helps to mitigate the spreading of WannaCry.
  • 5. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 597 Initially, malware Petya used email attachments (Phishing attack) as the attack vector, later a variant of malware Petya use EternalBlue and EternalRomance hacking tools as the attack vector and is known as NotPetya. NotPetya use Mimikatz tool as a dropper to steal the administrator password from the memory on a compromised system. It was built to spread more quickly and doesn’t have a similar kill switch inbuilt into the malware code like WannaCry. May be the malware creators might have learned their lessons from WannaCry. One of the main victims of NotPetya was Shipping industry. Maersk shipping company had impacted the NotPetya malware forced to lock down their entire global IT system for few days. The shipping company have presence all over the world. Maersk is responsible for 76 shipping ports spread across the globe including container ships with tens of millions of tons of cargo shipmentswhich is equal to a fifth of the entire world’s shipping capacity, locked down in the sea for days due to malware attack [25]. In Oct 2018, The Cybersecurity and Infrastructure Security Agency (CISA) part of Department of Homeland security (DHS) in United State of America, released a report on cybersecurity threats to precision agriculture [26]. DHS report warned about the impact on Confidentiality, Integrity and Availability (CIA) of data. Agriculture industry have adopted latest and advanced technologies such as remote sensors, equipment automation, global positions systems (GPS), location tracking systems, robotics, machine learning, edge computing and other communication network systems to decrease the operations cost and to increase the productivity of the farming. Agriculture not only a private business of an individual farmer, it is vitally important to the nation’s overall economic and food security. The farmer community supplies food for the entire nation and also provides economic exports globally. Cyber-attack on the agriculture sector can have impact on the economy of a nation. SCADA systems are used to control and monitor critical infrastructure of a state or nation, such as electricity distribution, transportation of gas, oil pipelines, water management and distribution, traffic lights and other systems in a modern society. There are known incidents recorded in RISI database which covers from trojan attack on Siberian Gas Pipeline explosion in 1982 to German steel mill cyber-attack in 2015. Advanced social engineering used as the attack vector to gain access in the German steel mill network which led to the malfunction of the furnace. Stuxnet is a famous worm had stuck the Iranian nuclear facility at Natanz in 2010, which consider as one of the most complex malwares. The Stuxnet malware was designed specifically to exploit the Siemens systems and frequency-converter drives used to power the centrifuges made by Fararo Paya in Iran and Vacon in Finland. Malware Duqu and Flame are very similar to Stuxnet malware which are also developed as a Cyberweapon for the disruption of critical infrastructure [27]. In 2016, Mirai malware, a cyberweapon,used IoT devices to create a large botnet system name Mirai was successful in bring down OVH cloud service provider by launching 1.1 Tbps DDoS attack [28]. The attack is considered as one of the largest DDoS attacks till today. IV. MOTIVATION Today’s modern society is a massive sociotechnical system. Researchers have highlighted that cyber-attacks are indeed associated with social, political, economic and cultural (SPEC) conflicts [29]. Most countries are investing in technologically advanced infrastructure [30]. The critical infrastructures are the backbone of a state or a nation. It is crucial to protect during times of political conflicts and social instability. Motivation for political led cyberattacks are mostly to spread propaganda, protest against political actions, protest again certain laws, outrage against acts related to government or related organization’s physical violence to the general public. In 2016, Russia’s involvement in U. S presidential election was a
  • 6. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 598 politically motivated attack. US Democratic National committee (DNC) candidate’s private email server had been compromised. The emails were stolen and published in Wikileaks website. DNC blames Russia is responsible for the cyber- attack to influence the presidential election. Russia is blamed for 2007’s DDoS attack on Estonian government and commercial websites which lasted for days. The attack impacted Estonian banks, new agencies, ministries, newspapers and broadcasters and government website [31]. The motivation for the attack was related to cultural and political conflict of interest. The attack originated from the disagreement between Estonian government and Russia about the relocation of the Bronze Soldier of Tallinn grave. Socio-cultural conflicts can also motivate cyberwar, Twain and China in 1999, Russia and Georgia in 2008, Ongoing Israel and Palestine are examples of socio-cultural triggered cyber-attacks [32]. Other than for fun and curiosity, one other main motivation for a cyber-attack is personal or corporate financial greed. Economically motivated attacks are usually done by cyber mercenaries, cyber criminals, organized cartels. In 2009, personal economic situations have led individuals to choose cybercrime industry. Due to economic meltdown in IT sector in China, many lost their job and turned to cybercrime activity for economical reason [33]. Recently Amazon.com Inc become victim of cyber-attack, around hundred seller accounts have been compromised and stolen the money from these accounts [34]. V. CONCLUSION Cyber-attacks can cause significant loss of business intelligence and intellectual property, damage brand reputation, loss of money. As the number and evolving technical complexity of the malware is increasing day by day, current malware detecting mechanisms is not providing enough capabilities to keep the hackers out of the system. Moreover, the upsurge of cyber CaaS (Crime as a Service) business in dark web, even less skilled cyber- criminals can buy malware bundles to launch sophisticated attacks and the shift of cyberspace into cyberwarfare. It is clear that the cyberspace is an arm race, with one side contributing to the betterment of human life and the other side is a growing threat for the world. VI. FUTURE SCOPE As the Internet and the smart devices are more deeply penetrate our lives, we at personal level starting to face new privacy and security vulnerabilities. With the revolution of IoT, everything ties together from cars, our homes, phones, traffic navigation, entertainment, to our medical devices through the Internet. Cyber security become one of the critical elements in today world. As per the evolving risks landscape 2009-2019 report of the world economic forum, cyber-attack is ranked among third in 2018 and fifth in 2019 report. There is a saying “a chain is only as strong as its weakest link” and it apply to the cyber security as well. Malware is constantly evolving to adapt to the changing modern technology. The new variants are more and more sophisticated, designed to exploit zero-day vulnerabilities, penetrate most security devices and avoid detection. Malwares already using techniques like polymorphic and metamorphic to change their code as they propagate to avoid detection. Advanced Persistence Threat (APT) is another method of cyber-attack, use sophisticated hacking techniques to gain access to a system and remain undetected inside the system for a prolonged period of time. Cyber threats are getting more advanced with upsurge of highly skilled hackers and the nation- state sponsorship, led to the development of sophisticated hacking tools. In 2018, 12th May the WannaCry ransomware attack on UK’s NHS costs billions of pounds to repair the damage and the 26th May, the NotPetya malware caused damage of billions of dollars to fix. Researchers believe that
  • 7. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 599 the WannaCry is from North Korea and NotPetya is from Russia. But the underline hacking tool which used for both the cyber-attacks was developed by CIA as a cyberweapon. Nation-states are considering cyber-as-a-weapon, and some nations are already preparing for cyberwarfare. Similar to regular military exercises, Cybersecurity and Infrastructure Security Agency (CISA) conducts national-level cyber exercise called Cyber Storm [35], that simulates coordinated cyber-attack at large-scale impacting the U.S critical infrastructure. The exercise includes employees from private industry, federal government agencies and international partners. As the modern society becomes more and more digitally interconnected, maintaining cybersecurity will become more difficult. As per the world economic forum, “Cyberspace has become a fifth dimension of warfare” other than land, sea, air and space. Hence it is critical for countries to prepare and defend from related cyberwar. Cyberwar is not new, it has been going on over a decade, using different methods such as data leaking, DDoS, website attack. But the impact of the cyber-attacks from damaging a file on a personal computer to destabilising a corporate business overnight has now shifted to having an impact on global political and economic system. National level cyberwarfare can have more severer consequences than hacking corporate emails or leaking data. Cyberwarfare can result in pipeline gas explosion, nuclear reactor malfunction, power grid shutdown and weapon system sabotage. It was reported that Chinese government hackers had stolen 614 Gbs of data from a U.S Navy contractor [36]. Same year China-linked spy group named APT15 was involved in an attack aimed to an organisation that provides services to U.K government. The attack was targeted to U.K government departments and military technology [37]. In this digital age, some countries are considering retaliation with military option as a response for the cyber-attack on their nation. In 2019, Israeli DefenseForce claimed that they responded Hamas cyber-attack with military operation. The main concern with cyberwar is that it is still enormously complex, need new international laws and framework. With the growing concerns over the cyberwarfare, Microsoft came out with a petition to demand “Digital Peace Now” [38] to highlight the devastating consequences of Cyberwar that could impact the future of human, and this issue must not be ignored. REFERENCES [1] T. C. o. E. Advisers, “The Cost of Malicious Cyber Activity to the U.S. Economy,” Feb 2018. [Online]. Available: https://www.whitehouse.gov/wp-content/uploads/2018/03/The-Cost- of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf. [2] DaBoss, “Number of Viruses,” 28 Feb 2013. [Online]. Available: https://www.cknow.com/cms/vtutor/number-of-viruses.html. [3] “Computer viruses hit one million,” 10 Apr 2008. [Online]. Available: http://news.bbc.co.uk/2/hi/technology/7340315.stm. [4] I. M. Bushra A Al Ahmadi, “Mal Classifier: Malware family classification using network flow sequence behavior,” 2018. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/8376209. [5] M. R. Julia Murphy, “Growth of the Internet,” [Online]. Available: https://ourworldindata.org/internet. [6] J. Clark, “What is the Internet Of things?” 17 Nov 2016. [Online]. Available: https://www.ibm.com/blogs/internet-of-things/what-is-the- iot/. [7] W. E. Forum, “Is this the future of the Internet of Things?” 27 Nov 2015. [Online]. Available: https://www.weforum.org/agenda/2015/11/is-this-future-of-the- internet-of-things/. [8] J. Mo, “What Can We Learn from Anti-malware Naming Conventions?” 05 Nov 2015. [Online]. Available: https://www.opswat.com/blog/what- can-we-learn-anti-malware-naming-conventions. [9] “Malware names,” Microsoft, 04 Aug 2019. [Online]. Available: https://docs.microsoft.com/en-us/windows/security/threat- protection/intelligence/malware-naming. [10] “New Threat Detection Naming Scheme in Trend Micro,” 28 Apr 2019. [Online]. Available: https://success.trendmicro.com/solution/1119738- new-threat-detection-naming-scheme-in-trend-micro. [11] F. Cohen, “Experiments with Computer Viruses,” [Online]. Available: http://www.all.net/books/virus/part5.html. [12] Dr. Vesselin Bontchev, “Current Status of the CARO Malware Naming Scheme,” [Online]. Available: https://bontchev.nlcv.bas.bg/papers/pdfs/caroname.pdf. [13] “Revisiting the Sony Rootkit,” [Online]. Available: https://fsfe.org/activities/drm/sony-rootkit-fiasco.en.html. [14] C. S. B. B. K. Hojoon Lee, “Lord of the x86 Rings: A Portable User Mode Privilege Separation Architecture on x86,” [Online]. Available: https://arxiv.org/pdf/1805.11912.pdf. [15] A. S. A. Mohammed Farik, “Analysis of Default Passwords In Routers Against Brute-Force Attack,” 09 Sep 2015. [Online]. Available: http://www.ijstr.org/final-print/sep2015/Analysis-Of-Default- Passwords-In-Routers-Against-Brute-force-Attack.pdf. [16] J. M. F. M. D. L. C. J. Basil AsSadhan, “Detecting Botnets using Command and Control Traffic,” [Online]. Available: https://ieeexplore.ieee.org/abstract/document/5190367. [17] S. Employee, “What is a botnet?” [Online]. Available: https://us.norton.com/internetsecurity-malware-what-is-a-botnet.html.
  • 8. International Journal of Scientific Research and Engineering Development-– Volume 2 Issue 3, May –June 2019 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 600 [18] B.-Y. K. Seok-Keun Yoo, “The Effective Factors of Cloud Computing Adoption Success in Organization,” The Journal of Asian Finance, Economics and Business, vol. 6, 2018. [19] A. K. M. A. Issa M Khalil, “Cloud Computing Security: A Survey,” MDPI, vol. 3, 2014. [20] L. A. G. M. P. L. L. Z. Katherine Campbell, “The economic cost of publicly announced information security breaches: empirical evidence from the stock market,” 1 Jul 2003. [Online]. Available: https://content.iospress.com/articles/journal-of-computer- security/jcs192. [21] R. L. M. S. Jitesh Ubrani, “Double-Digit Growth Expected in the Smart Home Market, Says IDC,” 29 Mar 2019. [Online]. Available: https://www.idc.com/getdoc.jsp?containerId=prUS44971219. [22] C. TALOS, “VPNFilter,” 06 June 2018. [Online]. Available: https://blog.talosintelligence.com/2018/06/vpnfilter-update.html. [23] Symantec, “VPNFilter malware now targeting even more router brands. How to check if you're affected.,” 29 June 2018. [Online]. Available: https://us.norton.com/internetsecurity-emerging-threats-vpnfilter- malware-targets-over-500000-routers.html. [24] S. G. J. K. C. H. A. D. Guy Martin, “WannaCry—a year on,” 04 Jun 2018. [Online]. Available: https://www.bmj.com/content/361/bmj.k2381.full. [25] D. Herbener, “The Economics of Cybersecurity and Cyberwarfare: A Case Study,” 05 Dec 2018. [Online]. Available: http://austrianstudentconference.com/wp- content/uploads/2019/02/ASSC-2019-Lorenzo-Carrazana.pdf. [26] C. a. I. S. Agency, “Cybersecurity Threats to Precision Agriculture,” 03 Oct 2018. [Online]. Available: https://www.us- cert.gov/ncas/current-activity/2018/10/03/Cybersecurity-Threats- Precision-Agriculture. [27] D. C. R. Bill Miller, “A Survey of SCADA and Critical Infrastructure Incidents,” [Online]. Available: https://www.researchgate.net/profile/Bill_Miller5/publication/2623155 94_A_survey_SCADA_of_and_critical_infrastructure_incidents/links/ 551ab10f0cf2fdce843695f4.pdf. [28] C. Kolias, G. Kambourakis, A. Stavrou and J. V. Vi, “DDoS in the IoT: Mirai and Other Botnets,” [Online]. Available: https://ieeexplore.ieee.org/abstract/document/7971869. [29] A. S,. W. M. W. S. Q. Z. P. L. Robin Gandhi, “Dimensions of Cyber- Attacks: Cultural, Social, Economic, and Political,” [Online]. Available: https://ieeexplore.ieee.org/abstract/document/5725605. [30] C. Heathcote, “Forecasting infrastructure investment needs for 50 countries, 7 sectors through 2040,” 10 Aug 2017. [Online]. Available: https://blogs.worldbank.org/ppps/forecasting-infrastructure- investment-needs-50-countries-7-sectors-through-2040. [31] “The 2007 Estonian Cyberattacks: New Frontiers in International Conflict,” 21 Dec 2012. [Online]. Available: http://blogs.harvard.edu/cyberwar43z/2012/12/21/estonia-ddos- attackrussian-nationalism/. [32] A. S. W. M. W. S. Q. Z. P. L. Robin Gandhi, “Dimensions of Cyber- Attacks: Cultural, Social, Economic, and Political,” [Online]. Available: https://ieeexplore.ieee.org/document/5725605. [33] R. McMillan, “China becoming the world's malware factory,” 24 Mar 2009. [Online]. Available: https://www.networkworld.com/article/2265827/china-becoming-the- world-s-malware-factory.html. [34] J. Browning, “Amazon Hit by Extensive Fraud with Hackers Siphoning Merchant Funds,” 8 May 2019. [Online]. Available: https://www.bloomberg.com/news/articles/2019-05-08/amazon-hit-by- extensive-fraud-as-hackers-siphoned-merchant-funds. [35] “Cyber Storm VI: National Cyber Exercise,” [Online]. Available: https://www.dhs.gov/cisa/cyber-storm-vi. [36] “Chinese Government Hackers Steal Trove of U.S. Navy Data: Report,” 08 Jun 2018. [Online]. Available: https://www.securityweek.com/chinese-government-hackers-steal- trove-us-navy-data-report. [37] “China-Linked Spies Used New Malware in U.K. Government Attack,” 12 March 2018. [Online]. Available: https://www.securityweek.com/china-linked-spies-used-new-malware- uk-government-attack. [38] “Microsoft Digital Peace Now,” [Online]. Available: https://digitalpeace.microsoft.com/know-the-issue/.