Publikace UTB
Repozitář publikační činnosti UTB

Time detection of malware threads

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Time detection of malware threads en
dc.contributor.author Strmiska, Martin
dc.contributor.author Měsíček, Pavel
dc.contributor.author Pekař, Libor
dc.contributor.author Jašek, Roman
dc.relation.ispartof Lecture Notes in Networks and Systems
dc.identifier.issn 2367-3370 Scopus Sources, Sherpa/RoMEO, JCR
dc.identifier.isbn 978-3-03-090320-6
dc.date.issued 2021
utb.relation.volume 231 LNNS
dc.citation.spage 1029
dc.citation.epage 1034
dc.event.title 5th Computational Methods in Systems and Software, CoMeSySo 2021
dc.event.location online
dc.event.sdate 2021-10-01
dc.event.edate 2021-10-01
dc.type conferenceObject
dc.language.iso en
dc.publisher Springer Science and Business Media Deutschland GmbH
dc.identifier.doi 10.1007/978-3-030-90321-3_85
dc.relation.uri https://link.springer.com/chapter/10.1007%2F978-3-030-90321-3_85
dc.subject cybersecurity en
dc.subject detection en
dc.subject dwell-time en
dc.subject malware en
dc.subject phishing en
dc.subject ransomware en
dc.subject Remote Desktop Protocol en
dc.description.abstract Malware is an unwanted software that performs actions in computers or computer networks, which users might disagree with. One of the worst types of malware is ransomware that affects the victim’s data by modifying, deleting, or blocking the access to them. Frequent malware attacks on organizations led to a change in malware detection from external identification (companies were dependent on other organizations or their products) to internal identification. Based on this, the time needed to detect ransomware (dwell time) has significantly decreased. Nowadays, internal detection prevails over the external one. The dwell time differs based on the continent. In the paper, the malware and ransomware descriptions with their variants are provided, and the concept of dwell time is described. Moreover, attention is not only paid to the reduction of dwell time within the recent years but also to how the most used vector attacks are connected. © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1010728
utb.identifier.obdid 43882796
utb.identifier.scopus 2-s2.0-85120690411
utb.source d-scopus
dc.date.accessioned 2021-12-22T11:51:36Z
dc.date.available 2021-12-22T11:51:36Z
dc.description.sponsorship IGA/CebiaTech/2021/006
utb.ou CEBIA-Tech
utb.contributor.internalauthor Strmiska, Martin
utb.contributor.internalauthor Měsíček, Pavel
utb.contributor.internalauthor Pekař, Libor
utb.contributor.internalauthor Jašek, Roman
utb.fulltext.affiliation Martin Strmiska1, Pavel Mesicek1, Libor Pekar1 and Roman Jasek1 1 Tomas Bata University, Zlin, Czechia strmiska@utb.cz
utb.fulltext.dates -
utb.fulltext.references 1. FireEye, M-Trends 2020, https://content.fireeye.com/m-trends/rpt-m-trends-2020, last accessed 2021/7/6. 2. Shetty, N., Praveen, R.: A Survey Paper on Malware Detection Techniques. International Journal of Advanced Trends in Computer Science and Engineering, vol. 10, pp. 558–563. The World Academy of Research in Science and Engineering, Online (2021). 3. Malware | Detection, Prevention, Protection & Removal | Avast, https://www.avast.com/ctopic-malware, last accessed 2021/6/13. 4. Kovacs, E.: Breaches Detected Faster, But Ransomware Surge a Major Factor, https://www.securityweek.com/breaches-detected-faster-ransomware-surge-major-factorfireeye, last accessed 2021/4/13. 5. Why Cybersecurity should be part of Internal Communication Strategies. https://kingeclient.com/why-cybersecurity-should-be-part-of-internal-communication-strategies, last accessed 2019/5/14. 6. Resource Center - Spyware and Adware. Hamilton College. https://my.hamilton.edu/offices/lits/rc/spyware-and-adware, last accessed 2018/3/23. 7. Leyden, J.: Ransomware attacks more than doubled last year as cybercrime operations scale up during coronavirus pandemic. The Daily Swig | Cybersecurity News and Views. https://portswigger.net/daily-swig/ransomware-attacks-more-than-doubled-last-year-as-cybercrime-operations-scale-up-during-coronavirus-pandemic, last accesed 2021/6/30. 8. Group-IB, Ransomware uncovered: Attackers’ latest methods, https://go.groupib.com/rs/689-LRE-818/images/Group-IB_Ransomware_Uncovered_whitepaper_eng.pdf. 9. Haller, M. (2020, Proč zabezpečení RDP pomocí VPN hackery nezastaví. https://martinhaller.cz/bezpecnost/proc-zabezpeceni-rdp-pomoci-vpn-hackery-nezastavi, last accessed 2020/2/24. 10. Tsai O., Chang M.: Attacking SSL VPN - Part 3: The Golden Pulse Secure SSL VPN RCE Chain, with Twitter as Case Study! https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study, last accessed 2019/9/2. 11. Tsai O., Chang M.: Attacking SSL VPN - Part 2: Breaking the Fortigate SSL VPN. https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn, last accessed 2019/9/9. 12. Tsai O., Chang M.: Attacking SSL VPN - Part 1: PreAuth RCE on Palo Alto GlobalProtect, with Uber as Case Study! https://devco.re/blog/2019/07/17/attacking-ssl-vpn-part-1-PreAuth-RCE-on-Palo-Alto-GlobalProtect-with-Uber-as-case-study, last accessed 2019/7/17. 13. Securing Remote Desktop (RDP) for System Administrators. https://security.berkeley.edu/education-awareness/securing-remote-desktop-rdp-system-administrators, last accessed 2021/8/8. 14. Lakshmanan, R.: Pulse Secure VPNs Get New Urgent Update for Poorly Patched Critical Flaw. https://thehackernews.com/2021/08/pulse-secure-vpns-get-new-urgent-update.html, last accessed 2021/8/9. 15. Aycock, J. Computer Viruses and Malware. Springer, pp. 14–15. 16. Fortinet, What Is a Trojan Horse? Trojan Virus and Malware Explained | Fortinet, https://www.fortinet.com/resources/cyberglossary/trojan-horse-virus, last accessed 2021/8/9. 17. Souri, A., Hosseini, R. A state-of-the-art survey of malware detection approaches using data mining techniques, Human-centric Computing and Information Sciences, vol. 8, pp. 1-22. 18. Zavrak, S. Adware: A Review. International Journal of Computer Science and Information Technologies, vol. 6, 2015. 19. Brewer, R. Ransomware attacks: detection, prevention and cure. Network Security, 2016(9), p. 59. 20. Forbes, Another Ransomware Campaign Threatens to Expose Victims’ Data. https://www.forbes.com/sites/leemathews/2020/01/23/another-ransomware-campaignthreatens-to-expose-victims-data/#271fbefd770a, last accessed 2021/8/9. 21. eTrust, eTrust Spyware Encyclopedia - AIDS Information Trojan. http://www3.ca.com/securityadvisor/pest/pest.aspx?id=175, last accessed 2021/8/9. 22. BBC, Cyber-attack: Europol says it was unprecedented in scale - BBC News, https://www.bbc.com/news/world-europe-39907965, last accessed 2021/8/9.
utb.fulltext.sponsorship The paper was supported by Internal Grant Agency of Tomas Bata University in Zlín under the project number IGA/CebiaTech/2021/006.
utb.scopus.affiliation Tomas Bata University, Zlin, Czech Republic
utb.fulltext.projects IGA/CebiaTech/2021/006
utb.fulltext.faculty -
utb.fulltext.ou -
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam