Kontaktujte nás | Jazyk: čeština English
dc.title | Time detection of malware threads | en |
dc.contributor.author | Strmiska, Martin | |
dc.contributor.author | Měsíček, Pavel | |
dc.contributor.author | Pekař, Libor | |
dc.contributor.author | Jašek, Roman | |
dc.relation.ispartof | Lecture Notes in Networks and Systems | |
dc.identifier.issn | 2367-3370 Scopus Sources, Sherpa/RoMEO, JCR | |
dc.identifier.isbn | 978-3-03-090320-6 | |
dc.date.issued | 2021 | |
utb.relation.volume | 231 LNNS | |
dc.citation.spage | 1029 | |
dc.citation.epage | 1034 | |
dc.event.title | 5th Computational Methods in Systems and Software, CoMeSySo 2021 | |
dc.event.location | online | |
dc.event.sdate | 2021-10-01 | |
dc.event.edate | 2021-10-01 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Springer Science and Business Media Deutschland GmbH | |
dc.identifier.doi | 10.1007/978-3-030-90321-3_85 | |
dc.relation.uri | https://link.springer.com/chapter/10.1007%2F978-3-030-90321-3_85 | |
dc.subject | cybersecurity | en |
dc.subject | detection | en |
dc.subject | dwell-time | en |
dc.subject | malware | en |
dc.subject | phishing | en |
dc.subject | ransomware | en |
dc.subject | Remote Desktop Protocol | en |
dc.description.abstract | Malware is an unwanted software that performs actions in computers or computer networks, which users might disagree with. One of the worst types of malware is ransomware that affects the victim’s data by modifying, deleting, or blocking the access to them. Frequent malware attacks on organizations led to a change in malware detection from external identification (companies were dependent on other organizations or their products) to internal identification. Based on this, the time needed to detect ransomware (dwell time) has significantly decreased. Nowadays, internal detection prevails over the external one. The dwell time differs based on the continent. In the paper, the malware and ransomware descriptions with their variants are provided, and the concept of dwell time is described. Moreover, attention is not only paid to the reduction of dwell time within the recent years but also to how the most used vector attacks are connected. © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1010728 | |
utb.identifier.obdid | 43882796 | |
utb.identifier.scopus | 2-s2.0-85120690411 | |
utb.source | d-scopus | |
dc.date.accessioned | 2021-12-22T11:51:36Z | |
dc.date.available | 2021-12-22T11:51:36Z | |
dc.description.sponsorship | IGA/CebiaTech/2021/006 | |
utb.ou | CEBIA-Tech | |
utb.contributor.internalauthor | Strmiska, Martin | |
utb.contributor.internalauthor | Měsíček, Pavel | |
utb.contributor.internalauthor | Pekař, Libor | |
utb.contributor.internalauthor | Jašek, Roman | |
utb.fulltext.affiliation | Martin Strmiska1, Pavel Mesicek1, Libor Pekar1 and Roman Jasek1 1 Tomas Bata University, Zlin, Czechia strmiska@utb.cz | |
utb.fulltext.dates | - | |
utb.fulltext.references | 1. FireEye, M-Trends 2020, https://content.fireeye.com/m-trends/rpt-m-trends-2020, last accessed 2021/7/6. 2. Shetty, N., Praveen, R.: A Survey Paper on Malware Detection Techniques. International Journal of Advanced Trends in Computer Science and Engineering, vol. 10, pp. 558–563. The World Academy of Research in Science and Engineering, Online (2021). 3. Malware | Detection, Prevention, Protection & Removal | Avast, https://www.avast.com/ctopic-malware, last accessed 2021/6/13. 4. Kovacs, E.: Breaches Detected Faster, But Ransomware Surge a Major Factor, https://www.securityweek.com/breaches-detected-faster-ransomware-surge-major-factorfireeye, last accessed 2021/4/13. 5. Why Cybersecurity should be part of Internal Communication Strategies. https://kingeclient.com/why-cybersecurity-should-be-part-of-internal-communication-strategies, last accessed 2019/5/14. 6. Resource Center - Spyware and Adware. Hamilton College. https://my.hamilton.edu/offices/lits/rc/spyware-and-adware, last accessed 2018/3/23. 7. Leyden, J.: Ransomware attacks more than doubled last year as cybercrime operations scale up during coronavirus pandemic. The Daily Swig | Cybersecurity News and Views. https://portswigger.net/daily-swig/ransomware-attacks-more-than-doubled-last-year-as-cybercrime-operations-scale-up-during-coronavirus-pandemic, last accesed 2021/6/30. 8. Group-IB, Ransomware uncovered: Attackers’ latest methods, https://go.groupib.com/rs/689-LRE-818/images/Group-IB_Ransomware_Uncovered_whitepaper_eng.pdf. 9. Haller, M. (2020, Proč zabezpečení RDP pomocí VPN hackery nezastaví. https://martinhaller.cz/bezpecnost/proc-zabezpeceni-rdp-pomoci-vpn-hackery-nezastavi, last accessed 2020/2/24. 10. Tsai O., Chang M.: Attacking SSL VPN - Part 3: The Golden Pulse Secure SSL VPN RCE Chain, with Twitter as Case Study! https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study, last accessed 2019/9/2. 11. Tsai O., Chang M.: Attacking SSL VPN - Part 2: Breaking the Fortigate SSL VPN. https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn, last accessed 2019/9/9. 12. Tsai O., Chang M.: Attacking SSL VPN - Part 1: PreAuth RCE on Palo Alto GlobalProtect, with Uber as Case Study! https://devco.re/blog/2019/07/17/attacking-ssl-vpn-part-1-PreAuth-RCE-on-Palo-Alto-GlobalProtect-with-Uber-as-case-study, last accessed 2019/7/17. 13. Securing Remote Desktop (RDP) for System Administrators. https://security.berkeley.edu/education-awareness/securing-remote-desktop-rdp-system-administrators, last accessed 2021/8/8. 14. Lakshmanan, R.: Pulse Secure VPNs Get New Urgent Update for Poorly Patched Critical Flaw. https://thehackernews.com/2021/08/pulse-secure-vpns-get-new-urgent-update.html, last accessed 2021/8/9. 15. Aycock, J. Computer Viruses and Malware. Springer, pp. 14–15. 16. Fortinet, What Is a Trojan Horse? Trojan Virus and Malware Explained | Fortinet, https://www.fortinet.com/resources/cyberglossary/trojan-horse-virus, last accessed 2021/8/9. 17. Souri, A., Hosseini, R. A state-of-the-art survey of malware detection approaches using data mining techniques, Human-centric Computing and Information Sciences, vol. 8, pp. 1-22. 18. Zavrak, S. Adware: A Review. International Journal of Computer Science and Information Technologies, vol. 6, 2015. 19. Brewer, R. Ransomware attacks: detection, prevention and cure. Network Security, 2016(9), p. 59. 20. Forbes, Another Ransomware Campaign Threatens to Expose Victims’ Data. https://www.forbes.com/sites/leemathews/2020/01/23/another-ransomware-campaignthreatens-to-expose-victims-data/#271fbefd770a, last accessed 2021/8/9. 21. eTrust, eTrust Spyware Encyclopedia - AIDS Information Trojan. http://www3.ca.com/securityadvisor/pest/pest.aspx?id=175, last accessed 2021/8/9. 22. BBC, Cyber-attack: Europol says it was unprecedented in scale - BBC News, https://www.bbc.com/news/world-europe-39907965, last accessed 2021/8/9. | |
utb.fulltext.sponsorship | The paper was supported by Internal Grant Agency of Tomas Bata University in Zlín under the project number IGA/CebiaTech/2021/006. | |
utb.scopus.affiliation | Tomas Bata University, Zlin, Czech Republic | |
utb.fulltext.projects | IGA/CebiaTech/2021/006 | |
utb.fulltext.faculty | - | |
utb.fulltext.ou | - |