Malware Secrets: De-Obfuscating in the Cloud (original) (raw)

2017, 2017 IEEE 10th International Conference on Cloud Computing (CLOUD)

Malicious software, universally known as malware, is typically used to cause disruption as it tries to steal sensitive information such as passwords, credit card numbers and other pertinent information. Malware infections have increased tremendously over the last decade. Recent reports indicate that around 70% of malware infections go undetected by the antivirus software. The infections that remain undetected fall into the category of zero-day malware, which is defined as malware that is new and is essentially an undiscovered and undisclosed threat. Furthermore, its substructure or the functioning has not been understood, and no signatures have been defined to distinguish the zero-day malware from others. Moreover, an average enterprise receives 17,000 malware alerts per week, and if 70% goes undetected, then one is certain to be infected by the zero-day malware every week. Therefore, the low detection rates and increasing vulnerabilities have created an unmet need for the researche...

Survey on Framework for Malware analysis and Detection in Cloud Environments

International Journal of Computer Science and Information Security (IJCSIS), 2023

Cloud computing plays an important role in all aspects of information storage and delivery of online services. It offers several advantages over the traditional storage and sharing scheme, e.g. easy access, on-demand storage, scalability and decreasing costs. The use of its rapidly evolving technologies can bring many benefits for protecting the Internet of Things (IoT), Cyber-Physical Systems (CPS) from a variety of cyber attacks, with IoT, CPS bringing opportunities to the people in your life daily. As malicious software (malware) is growing exponentially and there is no known approach to detecting malware, using cloud environments to detect malware can be a promising method. A new generation of malware uses advanced obfuscation and packaging techniques to evade detection systems. This situation makes it nearly impossible to detect complex malware using a traditional detection approach. The whitepaper provides a comprehensive overview of cloud-based malware detection approach and provides insight to understand the benefits of cloud for IoT, CPS protection against cyber attacks. This study explains the advantages and disadvantages of cloud environments in malware detection and also proposes a cloudbased malware detection framework that uses a hybrid approach to malware detection. Index Terms — Cloud computing, cloud malware detection, cyber-physical system, malware detection.

A Dynamic Malware Detection in Cloud Platform

International Journal of Difference Equations, 2020

Cloud computing not only provides high availability on elastic resources, scalable, and cost-efficient. The platform is also widely used in information technology (IT) to support technology infrastructure and services. However, due to the complex environment and scalability of services, one of the highest security issues is malware attacks, where some of the antivirus scanner unable to detect metamorphic malware or encrypted malware where these kinds of malware able to bypass some traditional protection solution. This is why a high recognition rate and good precision detection are important to eliminate a high false-positive rate. Machine Learning (ML) classifiers are a critical role in artificial intelligent-system. However, machine learning will require to learn from the high amplitude of input data; classify then only able to generate a reliable model with a high detection rate. The objective of this work is to study and performs detection based on dynamic malware analysis and cl...

Malware detection in cloud infrastructure

2019

In today’s era, Cloud services area unit distinguished among the non-public, public and business domains. Several of those services area unit expected to bealways on and have an important nature; so, security and resilience area unit progressively necessary aspects. As there is a huge growth of internet which increases major challenge is internet security. There is large amount of threats are evolved which harm our computer systems or internet security. There are various types of malwares are invented with small variant which is trying to damaged our computer system. Malware means malicious data. These malwares are come up with different files format like PE, EXE file etc. There are various antiviruses are available which scan the file and remove the malware. But now days the various malwares are emerged with some variants and the antiviruses are incapable to identify that malwares. For detecting any type of malware and one variation is that it also classifies the malware into their...

Challenges of Malware Analysis : Obfuscation Techniques

2018

It is a big concern to provide the security to computer system against the malware. Every day a millions of new malware are developed and the worse thing is that new malware are highly sophisticated which are very difficult to detect. Because the malware developers use the various obfuscation techniques to hide the actual code or the behaviour of malware. Thereby, it becomes very hard to analyze the malware for getting the useful information in order to design the malware detection system because of anti-static and anti-dynamic analysis technique (obfuscation techniques). In this paper, various malware obfuscation techniques are discussed in detail.

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.