Submit Search
Upload
Contending Malware Threat using Hybrid Security Model
•
0 likes
•
45 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i12/IRJET-V4I1278.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
- Mark - Fullbright
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
Research Paper
Research Paper
David Chaponniere
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
2016 Trends in Security
2016 Trends in Security
Ioannis Aligizakis, M.Sc.
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
Ioannis Aligizakis, M.Sc.
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
Ioannis Aligizakis, M.Sc.
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
AP DealFlow
Recommended
Turning the Tables on Cyber Attacks
Turning the Tables on Cyber Attacks
- Mark - Fullbright
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
Research Paper
Research Paper
David Chaponniere
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec Technology and Consulting
2016 Trends in Security
2016 Trends in Security
Ioannis Aligizakis, M.Sc.
Microsoft Security Intelligence Report vol. 21
Microsoft Security Intelligence Report vol. 21
Ioannis Aligizakis, M.Sc.
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
Ioannis Aligizakis, M.Sc.
Comilion introduction presentation 26102012 (1)
Comilion introduction presentation 26102012 (1)
AP DealFlow
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
Editor IJMTER
Rapport X force 2014
Rapport X force 2014
Patrick Bouillaud
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
Websense 2013 Threat Report
Websense 2013 Threat Report
Kim Jensen
2013 Threat Report
2013 Threat Report
Envision Technology Advisors
Research Article On Web Application Security
Research Article On Web Application Security
SaadSaif6
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Mandar Kharkar
Risks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
Jose Lopez
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
Konstantinos Demertzis
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
Seqrite
Research challenges and issues in web security
Research challenges and issues in web security
IAEME Publication
IRJET- Phishing Web Site
IRJET- Phishing Web Site
IRJET Journal
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Happiest Minds Technologies
Ey giss-under-cyber-attack
Ey giss-under-cyber-attack
Комсс Файквэе
Current Emerging Threats
Current Emerging Threats
dnomura
CSS Trivia
CSS Trivia
Alert Logic
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
IAEME Publication
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET Journal
FireEye Advanced Threat Report
FireEye Advanced Threat Report
FireEye, Inc.
Anatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
185
185
vivatechijri
More Related Content
What's hot
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
Editor IJMTER
Rapport X force 2014
Rapport X force 2014
Patrick Bouillaud
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
Websense 2013 Threat Report
Websense 2013 Threat Report
Kim Jensen
2013 Threat Report
2013 Threat Report
Envision Technology Advisors
Research Article On Web Application Security
Research Article On Web Application Security
SaadSaif6
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Mandar Kharkar
Risks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
Jose Lopez
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
Konstantinos Demertzis
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
Seqrite
Research challenges and issues in web security
Research challenges and issues in web security
IAEME Publication
IRJET- Phishing Web Site
IRJET- Phishing Web Site
IRJET Journal
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Happiest Minds Technologies
Ey giss-under-cyber-attack
Ey giss-under-cyber-attack
Комсс Файквэе
Current Emerging Threats
Current Emerging Threats
dnomura
CSS Trivia
CSS Trivia
Alert Logic
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
IAEME Publication
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET Journal
FireEye Advanced Threat Report
FireEye Advanced Threat Report
FireEye, Inc.
What's hot
(20)
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
A Review paper on Securing PHP based websites From Web Application Vulnerabil...
Rapport X force 2014
Rapport X force 2014
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Websense 2013 Threat Report
Websense 2013 Threat Report
2013 Threat Report
2013 Threat Report
Research Article On Web Application Security
Research Article On Web Application Security
Cisco 2014 - Anual Security Report
Cisco 2014 - Anual Security Report
Risks and Security of Internet and System
Risks and Security of Internet and System
Bitdefender - Solution Paper - Active Threat Control
Bitdefender - Solution Paper - Active Threat Control
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
Top 5 Cybersecurity Risks in Banking
Top 5 Cybersecurity Risks in Banking
Research challenges and issues in web security
Research challenges and issues in web security
IRJET- Phishing Web Site
IRJET- Phishing Web Site
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Ey giss-under-cyber-attack
Ey giss-under-cyber-attack
Current Emerging Threats
Current Emerging Threats
CSS Trivia
CSS Trivia
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
FireEye Advanced Threat Report
FireEye Advanced Threat Report
Similar to Contending Malware Threat using Hybrid Security Model
Anatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
185
185
vivatechijri
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
ijtsrd
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
IJERA Editor
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
Online Business
Cyber Security for Critical Infrastructure
Cyber Security for Critical Infrastructure
Mohit Rampal
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
IJNSA Journal
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
PavelVtek3
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
Product brochure-print-spread
Product brochure-print-spread
Tran Thi Thuy Tuyet
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET Journal
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
malbert5
V01 i010413
V01 i010413
IJARBEST JOURNAL
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Enterprise Insider
Vulnerability Management System
Vulnerability Management System
IRJET Journal
Application security testing an integrated approach
Application security testing an integrated approach
Idexcel Technologies
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
Deb Birch
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
IJNSA Journal
Similar to Contending Malware Threat using Hybrid Security Model
(20)
Anatomy of a cyber attack
Anatomy of a cyber attack
185
185
Designing Security Assessment of Client Server System using Attack Tree Modeling
Designing Security Assessment of Client Server System using Attack Tree Modeling
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
Behavior Analysis Of Malicious Web Pages Through Client Honeypot For Detectio...
En msft-scrty-cntnt-e book-cybersecurity
En msft-scrty-cntnt-e book-cybersecurity
Cyber Security for Critical Infrastructure
Cyber Security for Critical Infrastructure
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Product brochure-print-spread
Product brochure-print-spread
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
IRJET- Zombie - Venomous File: Analysis using Legitimate Signature for Securi...
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
V01 i010413
V01 i010413
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Vulnerability Management System
Vulnerability Management System
Application security testing an integrated approach
Application security testing an integrated approach
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
A SURVEY ON MALWARE DETECTION AND ANALYSIS TOOLS
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Ramkumar k
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
Dr. Deepak Mudgal
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
ronahami
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
sarkmank1
Signal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
National Chung Hsing University
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
BhangaleSonal
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
DineshKumar4165
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
sumitt6_25730773
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
vanyagupta248
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
Morshed Ahmed Rahath
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
SCMS School of Architecture
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
Hospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
rouholahahmadi9876
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
DineshKumar4165
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
ChandrakantDivate1
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Quintin Balsdon
Recently uploaded
(20)
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory Maximum Distortional ...
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
Signal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Hospital management system project report.pdf
Hospital management system project report.pdf
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
Contending Malware Threat using Hybrid Security Model
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 419 Contending Malware Threat using Hybrid Security Model M. Swapna1, G. Sunil Santhosh Kumar2 1,2Assistant Professor,, Dept. of CSE Marri Laxman Reddy Institute of Technology and Management, Telangana. ----------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Malware threat is continuously growing with sophistication. Though multiple layers of defense are provided at perimeter, network, host, application and data levels, it is still becoming a challenge to address malware related problems. They have grown in number as well as complexity and are responsible for attacks ranging from denial-of-service to compromising online banking accounts. In the recent times, blended attacks are popular with high severity of damage and are difficult to address using signature based antimalware solutions. Signature based anti-malware solutions are not able to detect zero- day malware. Though heuristic based anti-malware solutions are able to increase the detection rate, their false positive rate is high. Positive security model is effective but creates rigidity on environment. Through this paper we analyzed positive as well as negative security models and proposed hybrid security model for combating malware threat, considering the nature of Information Technology (IT) systems and their business objective. 1. INTRODUCTION In the last two decades malware related threats on Information Technology (IT) systems are growing continuously with lot of sophistication. Malware has evolved from virus to botnets, is responsible for attacks ranging from denial-of service to compromising online banking accounts. Blended threats are on the raise, which use a combination of malware attack vectors against different vulnerabilities to penetrate targets and carry out the malicious activity. These threats are used by cyber criminals to attack specific target user, by sending a socially engineered message in the form of an email or instant message that lures the user to click on a link. The link can be a pdf or doc file which contains malware that exploited vulnerabilities in software such as Adobe Reader or Microsoft Office. Malware payload in these exploited files silently executes on the target’s computer. In this way cybercriminal takes control of targeted computer and collects data from the network through the compromised computer. Attacks exploiting software vulnerabilities are growing due to the proliferation of software intensive systems. These attacks are targeted on information assets of high-profile organizations to steal intellectual property or to cause any other possible damage. Recent malware like Stuxnet, Duqu and Flame are very complex and are different from everyday malware. These malware have exploited zero-day vulnerabilities and were designed specifically to target industrial control systems. They used fake digitally signed components in order to appear as trustworthy applications. Stuxnet alone exploited four different zero-day vulnerabilities when attacking its targets [1]. It is initially spread through infected USB flash drives, and then it uses other exploits and techniques such as peer-to-peer RPC to infect and update other computers inside private networks which are not directly connected to the Internet. In the case of Flame, it is developed using SQLite, SSH, SSL and LUA libraries which helps it to look like a business database software than a piece of malware [2]. Duqu has many similarities to Stuxnet like modular structure, injection mechanisms and using fake digital signature [3]. Web-based malware infections are emerging as another major threat for websites and web users. These malware operate from flash based advertisements, HTML and in many forms of Javascript functions. Social networks and dynamic content have raised the delivery of sophisticated web threats. With Web 3.0 becoming the critical force for the future of cloud computing and increase in services offered through subscription based, there is a huge malware threat for these environments. Also, with the increase in usage of ubiquitous mobile devices such as smart phones and tablets, mobile malware is on the raise. Cyber criminals view these devices as highly-sensitive targets and are developing new ways to compromise personal data on mobile devices and breach privacy of individuals by tracking people etc. With the wider proliferation of Google Android, attacks exploiting vulnerabilities are increasing [4]. These malware threats are throwing new challenges for the anti-malware industry in developing effective anti-malware technologies. Signature-based approach tries to detect different malware by searching for known patterns of data within executable code. Although it is a commonly used technique for malware detection, it cannot detect unknown malware and it is also susceptible to evasion such as packing and junk code insertion. With the growing number of new vulnerabilities noticed every day and the unknown number of undisclosed vulnerabilities, zero-day attacks makes the malware signature set always incomplete [5]. Also since these solutions require a separate signature for each malware variant, database of signatures grow exponentially and becomes unmanageable. Heuristic based approach increases the detection rate of malware by using generic signatures to detect the variants of known malware. But its false positive rate is high. In recent times, anti-malware industry is looking at whitelisting, which allows only approved applications to run. Since whitelisting allows only known good, it is an effective way to address malware threat but it creates a rigid environment. Therefore, each of the different approaches
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 420 used in anti-malware solutions have their own advantages and disadvantages. In order to choose appropriate solution and provide practical security, there is a need to consider the nature of IT systems as well as their business objective. In this paper, the positive and negative security models are analyzed in detail and a Hybrid Security Model is proposed to combat malware threat on IT systems. 2. Positive and Negative Security Models Positive security model whitelist and allow only known good where as negative security model blacklist and block only known bad as depicted in Fig. 1. When no rule is defined negative security model would grant access to everything and when exploits are discovered rules are created and added. Adding more rules in negative security model increases the blocking behavior, thereby decreasing the threat through unknown and allowed, as security gets tightened. When no rule is defined in positive security model, everything is blocked. Once the resources / behavior are trusted, rules are created and added. Adding more rules in positive security model increases allowed behavior. Over the years, positive as well as negative security models are being used in order to secure our networks and systems. These models are implemented through popular mechanisms such as anti- virus, intrusion detection system / intrusion prevention system (IDS/IPS), network firewall etc. Known good in the form of whitelist of applications, IP addresses, port numbers, and application behavior are maintained and enforced in positive security model like Access Control Lists (ACLs) in firewalls [6]. Whereas, blacklist of known bad is maintained and enforced using negative security model like signatures in antivirus scanners, anti-spam engines etc. Figure 1. Positive Vs Negative Security Models Traditionally technology used to address malware issue is negative security model. Trusted third parties like antivirus companies maintain the blacklist of malware signatures and via Internet everyone is able to automatically update the blacklist and enforce them through antivirus scanner. When the known bad list is small, it is administratively easy to maintain blacklist and stop it [7]. But currently the number of malware software is growing rapidly and it is becoming administratively difficult to maintain and enforce the blacklist of signatures. Also this approach will not be able to detect malware which is bad but unknown like zero-day threats, which is a malware without corresponding antivirus signature. Unknown vulnerabilities in continuously evolving software systems are exploited and zero-day attacks are made. There is a vulnerability window that exists during the time between when vulnerability is first exploited and when software developers start to develop and publish a counter mechanism to that threat. It takes time for the developers to discover the existence of a new attack, analyze the attack to plan remedy, develop a defensive attack signature and distribute the same for enforcing at various endpoints. No matter how efficient the antivirus software is, the attack will always spread quickly before the vulnerability window can be closed. Also, if we analyze carefully it is very difficult to build any software like web application, database application and embedded application, which is completely vulnerability free. Skillful attackers would continuously make efforts to attack through unknown vulnerabilities and bypass signatures. Antivirus technology was originally designed for scanning files when they are created on PCs and not for addressing the threat coming through Internet. This technology is not effective against attacks that penetrate via active code executed in browsers or transferred through USB devices [8]. Currently, the malware that penetrate through the browser show the highest growth rate among all malware classes. Similarly, infected USB devices are another major channel for malware penetration as they are rarely scanned for malware when connected to a PC. Latest malware like Stuxnet and Conficker are using USB device as one of their methods for propagation. Though antivirus software tries to supplement signature scanning with behavior heuristics which looks for anomalies while processing and increases the detection rate but their false positive rate is high. With the increasing number of free software applications with hidden malicious behavior available on Internet, end users install these unauthorized software and corrupt their systems and networks. So it is important to use effective defense mechanism in order to protect our end points from growing malware threat. Also it is very clear that antivirus solutions are not effective for zero-day, Internet and USB device attacks. In this scenario, where malware attacks are using sophisticated techniques and also since their count is overtaking the genuine software, it is difficult to address the problem using negative security model alone. So there is a need to analyze the potential of positive security model. It is very clear that antivirus solutions are not effective for zero-day, Internet and USB device attacks. Rather than detecting and blocking threats, positive security model blocks all and only trusted items are allowed. In order to effectively implement positive security model, every part of IT infrastructure has to be discovered and whitelisted including hardware, software and
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 421 configuration like servers, desktops, printers, USB devices, applications, behavior of applications etc. It is required to create whitelisting rules for all trusted items of the network. Application whitelisting is an approach where only known or trusted applications are whitelisted and only those applications are allowed. This is effective in addressing the threat through unknown applications [9]. Though application whitelisting is a promising technique, it is also vulnerable to attacks. Any malware injected at runtime and operating from a whitelisted application cannot be detected. To address this problem, application behavior also needs to be whitelisted and enforced. One major approach to whitelist behavior of application is anomaly detection. In this approach, profile of application is captured and any deviations from this are flagged as suspicious. This approach is susceptible to false positives and mimicry attacks. Also it becomes difficult to capture the normal behavior of complex applications. Another approach for whitelisting behavior is specification based detection, in which all events from application to the operating system are mediated by a policy or specification. These policies are application specific and indicate whether the events are allowed or denied. Specification- based approach is flexible and has lower false positives. Though positive security model is effective, it is administratively challenging to maintain whitelist of known good and the granularity at which it has to be created and enforced. This approach would be relevant to systems which are less frequently changed or patched. Therefore in order to provide practical security, it is required to consider the nature of IT systems and secure them by using a combination of positive and negative security models. 3. Practical Security Framework using Hybrid Security Model In order to combat malware threat in different IT systems, a practical security framework using Hybrid Security Model is proposed. In this framework, IT systems are classified into home environments, corporate environments, online web services, cloud environments, embedded systems and mission critical environments. Each of these environments has different requirements of security and end user flexibility. Based on these requirements, security framework is proposed using a combination of positive and negative security models. Home environments are normally used for general purpose computing and entertainment. These environments do not have any critical business goal and user wants lot of flexibility in downloading and deploying applications of their choice. So, signature as well as heuristic based anti- malware solutions along with desktop firewall would be appropriate to secure these environments. Desktop firewall helps to allow only required ports and block all other ports in order to stop external infiltration. Also it is very important to configure these environments for automatic software updates. Signature as well as heuristic based anti-virus solutions, desktop firewall and configuring the end system for automatic software updates are also relevant in other IT systems like corporate environment, online web servers and cloud environment. These IT systems also require additional security solutions. Every corporate environment has a specific business goal. These environments have applications accessed by different stakeholders. In order to secure these environments, access to enterprise applications should be given only to authorized stakeholders. Also only enterprise specific applications are allowed to run in those environments. To enforce these security requirements, application whitelisting can be used. All enterprise specific applications can be whitelisted and only those applications are allowed. In order to check the integrity of whitelisted applications details like hash value, publisher etc can verified while loading the application for execution. In case if the organization want to allow users to deploy any other applications of their choice, then their access should be limited to only virtual environment without giving access to enterprise services. IT systems providing online web services have focused role of giving specific service online through web interface. Rules based on negative security model to cover common attacks like SQL injection, cross site scripting etc need to be supported. Dynamism and rapid evolution of new web technologies left security vulnerabilities at server side as well as client side components of web based applications. Since this is the root cause for growing web based attacks, it is very important to address this threat by monitoring HTTP protocol messages and whitelisting valid messages exchanged between client and web application. Therefore web application firewall also uses positive security model, which allows only web traffic that complies with web application behavior. These days’ services are being offered through cloud environments. These environments support scaling of applications due to their elastic nature. In these environments, different services are offered through different Virtual Machines (VMs) on the same machine or single service offered through different VMs across multiple machines and it is dynamically controlled. End point security deployed in these machines would not be able to provide VM level security. Also in most of the cases all machines of a particular cloud have similar software setup. In such a scenario, if unknown vulnerability is exploited in any one machine of cloud, with in no time it can bring down all other machines of the cloud. So, it is very important to harden virtualization layer. Application whitelisting, firewall and IDS/IPS functionalities have to be deployed and enforced with dynamic policies at virtual machine or hypervisor level. This also protects from the spread of threat from one VM to another VM. Most of the times, focus is not given to security aspects in embedded systems used at home, automobiles, controllers etc, which leaves them vulnerable to various security threats. Security can be easily compromised in these devices, like DNS settings on
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 422 wireless routers were updated by malware and computers connected through these devices to Internet are compromised. Since embedded systems are ubiquitous, it is very difficult to make security related updates after deployment even if vulnerabilities are detected later. So, it would be better to support whitelist based security to embedded devices and lock down the behavior of the embedded system. Since these devices have limited resources and created for specific purpose, specification based application behavior whitelisting using a light weight model would be an appropriate method to combat malware threat [10]. This reduces the likelihood of malware exploiting vulnerabilities and carrying out malicious activity. Mission critical IT systems like supervisory control and data acquisition (SCADA) systems have focused applications with critical business objective. Any vulnerability exploitation in these systems is a serious threat and it can bring down the operations. The functionality of critical applications in specifically defined way should be allowed for execution and any unknown or bad behavior should be blocked. Stuxnet malware was designed to propagate and target specific Supervisory Control and Data Acquisition System (SCADA). It has altered the control functions in the programmable logic controller (PLC) to physically destroy the equipment. So in these type of mission critical environments, it is always better to whitelist or allows known good at the granular level with dynamic whitelisting capabilities. Specification based application behavior whitelisting should be used at the granular level by whitelisting only those resources and operations specific to the behavior of critical application in the network. Positive security model has greater relevance in mission critical environments [11]. Therefore, it is very important to consider the business requirements of IT systems while implementing the practical security. Also with the growing attacks through unknown vulnerabilities, it is very important to give assurance to end user that functionality is implemented correctly and software provides only the desired features. So, it is important to provide assurance in software. Positive Security model can also play a vital role in providing assurance to end user. Assurance model can be evolved based on application whitelisting and its behavior whitelisting rules. Specification based application behavior whitelisting will enforce the whitelisted behavior and can also provide formal security assurance of IT systems [12]. Effective Application behavior whitelisting techniques at granular level have huge potential in providing security assurance of IT systems. Many research efforts are being made to come out with an effective light-weight behavior model by using static as well as dynamic analysis techniques [13][14] . 4. Conclusions It is becoming difficult to address today’s malware threat, using signature and heuristic based anti-malware solutions. With the growing zero-day attacks and also malware outnumber the genuine software, a combination of positive and negative security models is more appropriate to protect our IT systems. Practical security requirements of each IT system are different and depend on its business objective. Through this paper we analyzed positive and negative security models and proposed a Hybrid Security Model for IT systems to combat malware threat. As we move from home PC towards embedded system and mission critical environment, need for positive security model grows. Since home PC requires more flexibility negative security model would be appropriate. In mission critical environment, since any security threat can completely bring down the operations, positive security model is more appropriate. Specification based application behavior whitelisting is more effective in these environments. Also with the growing attacks by exploiting software vulnerabilities, it is required to give assurance to end user that functionality is implemented correctly and software provides only the desired features. Positive Security model can play a vital in providing assurance to end users. Research efforts in coming out with effective application behavior whitelisting techniques would help to provide security and also formal security assurance of IT systems. 5. References [1] Ryan Naraine, “Stuxnet attackers used 4 Windows zero day exploits,” http://www.zdnet.com/blog/security/stuxnetattackers- used-4-windows-zero-day-exploits/7347, Sep 14, 2010. [2] Mikko Hypponen, Why Antivirus Companies Like Mine Failed to Catch Flame and Stuxnet, http://www.wired.com/threatlevel/2012/06/internetsec urity- fail/, Jan 6, 2012. [3] Boldizsár Bencsáth, Gábor Pék, Levente Buttyán, Márk Félegyházi, Duqu: A Stuxnet - like malware found in the wild, http://www.crysys.hu/publications/files/bencsathPB F11duqu.pdf, Oct 14 2011.International Journal of Intelligent Computing Research (IJICR), Volume 3, Issue 3, September 2012 Copyright [4] Kaspersky Lab, Cyberthreat forecast for 2012, http://www.kaspersky.com/images/Kaspersky%20re port-10-134377.pdf, 2012. [5] Kevin Townsend, “Does it Matter if it’s Black or White (listing)?,” http://www.infosecuritymagazine. com/view/20083/does -it- matter –if -its black –or -white listing -/, Aug 18, 2011. [6] Alan Murphy and KJ (Ken) Salchow, “Applied Application Security— Positive & Negative Efficiency,” http://www.f5.com/pdf/whitepapers/ pplied-app- security-wp.pdf, Oct, 2007.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 12 | Dec-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 423 [7] Bruce Schneier, “Whitelisting vs. Blacklisting,” http://www.schneier.com/blog/archives/2011/01/whi telisting_vs.html, Jan 28, 2011. [8] Ogren Group, Endpoint Security: Moving Beyond AV, http://www.preventia.co.uk/resources/white_papers/ lumension/Endpoint-Security-Moving Beyond _AV Application- Whitelisting.pdf, Jul 2009. [9] Shyni, “Whitelist and Blacklist Entries,” http://strangerinmypc.com/108/, Feb 16, 2012. [10] Dave Shackleford, “Application Whitelisting: Enhancing Host Security,” http://www.sans.org/reading_room/analysts_progra m/McAfee_09_App_Whitelisting.pdf, Oct, 2009. [11] Brian Contos, “Host Security for SCADA and ICS Systems Part 2,” http://blogs.mcafee.com/enterprise/securityconnected/ host-security-for-scada-and-ics-systemspart- 2, Feb 22, 2012. [12] Patrice Godefroid, Michaeal Y. Levin, David Molnar, SAGE: Whitebox Fuzzing for Security Testing, Communications of the ACM, March 2012. [13] Peng Li, Hyundo Park, Debin Gao, Jianming Fu, Bridging the Gap between Data-flow and Control flow Analysis for Anomaly Detection, Annual Computer Security Applications Conference 2008. [14] Sandeep Bhatkar, Abhishek Chaturvedi, R. Sekar, Data flow Anomaly Detection, IEEE Symposium on Security and Privacy, 2006.
Download now