Analysis of known and unknown malware bypassing techniques

Nowadays, malware attacks are the most expensive damages for organizations in different types of computer and network systems. While different types of attacks are well surveyed and documented, little details related to bypass malware detections and defenses are provided in the public domains. Malw...

Full description

Bibliographic Details
Main Authors: Daryabar, Farid, Dehghantanha, Ali, Udzir, Nur Izura, Mohd Sani, Nor Fazlida, Shamsuddin, Solahuddin, Norouzizadeh, Farhood
Format: Article
Language:English
Published: Advanced Institute of Convergence Information Technology 2013
Online Access:http://psasir.upm.edu.my/id/eprint/30589/
http://psasir.upm.edu.my/id/eprint/30589/1/Analysis%20of%20known%20and%20unknown%20malware%20bypassing%20techniques.pdf
_version_ 1848846721054932992
author Daryabar, Farid
Dehghantanha, Ali
Udzir, Nur Izura
Mohd Sani, Nor Fazlida
Shamsuddin, Solahuddin
Norouzizadeh, Farhood
author_facet Daryabar, Farid
Dehghantanha, Ali
Udzir, Nur Izura
Mohd Sani, Nor Fazlida
Shamsuddin, Solahuddin
Norouzizadeh, Farhood
author_sort Daryabar, Farid
building UPM Institutional Repository
collection Online Access
description Nowadays, malware attacks are the most expensive damages for organizations in different types of computer and network systems. While different types of attacks are well surveyed and documented, little details related to bypass malware detections and defenses are provided in the public domains. Malware caused different types of attacks such as denial of service (DoS) attacks,business espionage, extorting money, etc. Therefore, implementing malware defenses for organizations’ internal networks are uttermost important.In this paper, bypassing the well-known and unknown malware through the host-based Anti Viruses (AVs) that are based on signature detection is illustrated, and it is shown that how even a known malware might be bypassed anti viruses and firewalls to be executed in organizations’ internal computer networks. Right after that, an unknown malware detection system to protect organization’s internal networks from unknown and known malware before they reach into the victims’ systems is surveyed and provided.
first_indexed 2025-11-15T09:07:12Z
format Article
id upm-30589
institution Universiti Putra Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T09:07:12Z
publishDate 2013
publisher Advanced Institute of Convergence Information Technology
recordtype eprints
repository_type Digital Repository
spelling upm-305892015-10-06T07:43:53Z http://psasir.upm.edu.my/id/eprint/30589/ Analysis of known and unknown malware bypassing techniques Daryabar, Farid Dehghantanha, Ali Udzir, Nur Izura Mohd Sani, Nor Fazlida Shamsuddin, Solahuddin Norouzizadeh, Farhood Nowadays, malware attacks are the most expensive damages for organizations in different types of computer and network systems. While different types of attacks are well surveyed and documented, little details related to bypass malware detections and defenses are provided in the public domains. Malware caused different types of attacks such as denial of service (DoS) attacks,business espionage, extorting money, etc. Therefore, implementing malware defenses for organizations’ internal networks are uttermost important.In this paper, bypassing the well-known and unknown malware through the host-based Anti Viruses (AVs) that are based on signature detection is illustrated, and it is shown that how even a known malware might be bypassed anti viruses and firewalls to be executed in organizations’ internal computer networks. Right after that, an unknown malware detection system to protect organization’s internal networks from unknown and known malware before they reach into the victims’ systems is surveyed and provided. Advanced Institute of Convergence Information Technology 2013-09 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/30589/1/Analysis%20of%20known%20and%20unknown%20malware%20bypassing%20techniques.pdf Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin and Norouzizadeh, Farhood (2013) Analysis of known and unknown malware bypassing techniques. International Journal of Information Processing and Management, 4 (6). pp. 50-59. ISSN 2093-4009; ESSN: 2233-940X http://www.aicit.org/ijipm/global/paper_detail.html?jname=IJIPM&q=229
spellingShingle Daryabar, Farid
Dehghantanha, Ali
Udzir, Nur Izura
Mohd Sani, Nor Fazlida
Shamsuddin, Solahuddin
Norouzizadeh, Farhood
Analysis of known and unknown malware bypassing techniques
title Analysis of known and unknown malware bypassing techniques
title_full Analysis of known and unknown malware bypassing techniques
title_fullStr Analysis of known and unknown malware bypassing techniques
title_full_unstemmed Analysis of known and unknown malware bypassing techniques
title_short Analysis of known and unknown malware bypassing techniques
title_sort analysis of known and unknown malware bypassing techniques
url http://psasir.upm.edu.my/id/eprint/30589/
http://psasir.upm.edu.my/id/eprint/30589/
http://psasir.upm.edu.my/id/eprint/30589/1/Analysis%20of%20known%20and%20unknown%20malware%20bypassing%20techniques.pdf