体育赛事投注记录

advertisement

Automated Malware Identifier and Analyzer

  • Monica MalikEmail author
  • Bhawna Narwal
Conference paper
  • 33 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1162)

Abstract

体育赛事投注记录malware analysis is an essential part for any kind of crimeware analysis required in an organization. at present, there are so many malware variants available in the market with the target to sneak into it exoskeleton of company. millions of noxious applications and programs are invented every month. most of the malware are so heavily disguised to be able to hide their original intent. while there are anti-malware softwares and firewalls available for help, but sometimes they are not enough, that is where malware analysis comes into the picture.

Keywords

Cyber-attacks Malware Metasploit Security VMWare 

References

  1. 1.
    Bulazel, A., Yener, B.: A survey on automated dynamic malware analysis evasion and counter-evasion: PC, mobile, and web. In: Proceedings of the 1st Reversing and Offensive-oriented Trends Symposium, p. 2. ACM (2017)
  2. 2.
    Blackthorne, J., Kaiser, B., Fuller, B., Yener, B.: Environmental authentication in malware. In: IACR Cryptology ePrint Archive, vol. 928 (2017)
  3. 3.
    Narwal, B., Mohapatra, A.K., Usmani, K.A.: Towards a taxonomy of cyber threats against target applications. J. Stat. Manag. Syst. 22(2), 301–325 (2019)
  4. 4.
    Miramirkhani, N., Appini, M.P., Nikiforakis, N., Polychronakis, M.: Spotless sandboxes: evading malware analysis systems using wear-and-tear artifacts. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 1009–1024. IEEE (2017)
  5. 5.
    Rani S., Narwal B., Mohapatra A.K.: RREQ flood attack and its mitigation in ad hoc network. In: Panda B., Sharma S., Roy N. (eds.) Data Science and Analytics. REDSET 2017. Communications in Computer and Information Science, vol. 799. Springer, Singapore (2017)
  6. 6.
    Sudhodanan, A., Carbone, R., Compagna, L., Dolgin, N., Armando, A., Morelli, U.: Large-scale analysis & detection of authentication cross-site request forgeries. In: IEEE European Symposium on Security and Privacy (EuroS&P), pp. 350–365. IEEE (2017)
  7. 7.
    Masri, R., Aldwairi, M.: Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro. In: 8th International Conference on Information and Communication Systems (ICICS), pp. 336–341. IEEE (2017)
  8. 8.
    Polino, M., Continella, A., Mariani, S., D’Alessio, S., Fontana, L., Gritti, F., Zanero, S.: Measuring and defeating anti-instrumentation-equipped malware. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 73–96. Springer, Cham (2017)
  9. 9.
    Narwal, B., Mohapatra, A.K.: A review on authentication protocols in Wireless Body Area Networks (WBAN). In: 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, India, pp. 227–232 (2018)
  10. 10.
    Tanabe, R., Ueno, W., Ishii, K., Yoshioka, K., Matsumoto, T., Kasama, T., Rossow, C.: Evasive malware via identifier implanting. In: International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 162–184. Springer, Cham (2018)
  11. 11.
    Narwal, B.: Fake news in digital media. In: International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, pp. 977–981 (2018)
  12. 12.
    Narwal, B., Mohapatra, A.K.: SEEMAKA: Secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks. Wireless Pers. Commun. (2020).
  13. 13.
    Narwal, B., Mohapatra, A.K.: SALMAKA: Secured, anonymity preserving and lightweight mutual authentication and key agreement scheme for wireless body area networks. Int. J. Sens. Wireless Commun. Control, 2020 (forthcoming)
  14. 14.
    Narwal, B., Mohapatra, A.K.: Secured secret sharing and reconstruction algorithm for organizations. In: 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, India, pp. 223–226 (2018)
  15. 15.
    Bharadwaj, P., Pal, H., Narwal, B.: Proposing a Key Escrow Mechanism for Real-Time access to End-to-End encryption systems in the Interest of Law Enforcement. In: 2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), Gurgaon, India, pp. 233–237 (2018)
  16. 16.
    Narwal, B.: Security analysis and verification of authenticated mobile payment protocols. In: 2019 4th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, pp. 202–207 (2019)
  17. 17.
    Dhawan, S., Narwal, B.: Unfolding the mystery of ransomware. In: International Conference on Innovative Computing and Communications, pp. 25–32. Springer, Singapore (2019)
  18. 18.
    Narwal, B., Mohapatra, A.K.: Performance analysis of QoS parameters during vertical handover process between Wi-Fi and WiMAX networks. In: International Conference on Recent Developments in Science, Engineering and Technology, pp. 330–344. Springer, Singapore (2017)
  19. 19.
    Narwal, B., Mohapatra, A.: Energy efficient vertical handover algorithm for heterogeneous wireless networks. Int. J. Control Theor. Appl. 9(19), 9221–9225 (2016)
  20. 20.
    Metasploit Homepage. . Last accessed 16 Oct 2019
  21. 21.
    ICO Convert Homepage. . Last accessed 14 Sept 2019
  22. 22.
    Krombholz, K., Hobel, H., Huber, M., Weippl, E.: Advanced social engineering attacks. J. Inf. Secur. Appl. 22, 113–122 (2015)
  23. 23.
    VirtusTotal Homepage. . Last accessed 11 Oct 2019
  24. 24.
    Msfvenom Homepage. . Last accessed 07 Sept 2019
  25. 25.
    Python Homepage. . Last accessed 15 Oct 2019
  26. 26.
    Capstone course Homepage. . Last accessed 24 Oct 2019
  27. 27.
    Pyew Homepage. . Last accessed 20 Oct 2019
  28. 28.
    Deshpande P., Sharma S.C., Peddoju S.K.: Implementation of a private cloud: a case study. In: Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol. 259. Springer, New Delhi (2014)
  29. 29.
    Deshpande, P., Sharma, S.C., Peddoju, S.K., et al.: Security and service assurance issues in cloud environment. Int. J. Syst. Assur. Eng. Manag. 9, 194–207 (2018).  
  30. 30.
    Deshpande, P.: Cloud of everything (CLeT): the next-generation computing paradigm. In: Computing in Engineering and Technology. Advances in Intelligent Systems and Computing, vol. 1025. Springer, Singapore (2020)

Copyright information

© Springer Nature Singapore Pte Ltd. 2021

Authors and Affiliations

  1. 1.Indira Gandhi Delhi Technical University for Women (IGDTUW)DelhiIndia

Personalised recommendations