Detection of privacy threat by peculiar feature extraction in malwares to combat targeted cyber attacks

1Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Targeted cyber-threats are topmost concern of organizations and technologies of today. Malwares having similar objectives bear common artifacts. Thus defining a detection mechanism based on such peculiar artifacts will not only help in detecting existing risks but also gives a considerable defense against unknown malicious attacks. About 903 known malware samples related to espionage were analyzed statically and a data set comprising related artifacts is established and also checked against the benign software. Weightage is given to each artifact on the difference of its existence in malicious and benign code and artifact’s relation to the expected targeted organization or technology thus catering for targeted attacks. Designed algorithm for detection of espionage attack has given 99.16 % of authentication and 99.33 % of precision. Real time alarm generation is also incorporated by API hooking using Detour library for latter detailed analysis of suspicious program or application by proposed algorithm.

Cite

CITATION STYLE

APA

Ahmad, F. H., Batool, K., & Javed, A. (2016). Detection of privacy threat by peculiar feature extraction in malwares to combat targeted cyber attacks. In Lecture Notes in Electrical Engineering (Vol. 362, pp. 1237–1247). Springer Verlag. https://doi.org/10.1007/978-3-319-24584-3_106

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free