Analysis of known and unknown malware bypassing techniques
Nowadays, malware attacks are the most expensive damages for organizations in different types of computer and network systems. While different types of attacks are well surveyed and documented, little details related to bypass malware detections and defenses are provided in the public domains. Malw...
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Advanced Institute of Convergence Information Technology
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30589/ http://psasir.upm.edu.my/id/eprint/30589/1/Analysis%20of%20known%20and%20unknown%20malware%20bypassing%20techniques.pdf |
| _version_ | 1848846721054932992 |
|---|---|
| author | Daryabar, Farid Dehghantanha, Ali Udzir, Nur Izura Mohd Sani, Nor Fazlida Shamsuddin, Solahuddin Norouzizadeh, Farhood |
| author_facet | Daryabar, Farid Dehghantanha, Ali Udzir, Nur Izura Mohd Sani, Nor Fazlida Shamsuddin, Solahuddin Norouzizadeh, Farhood |
| author_sort | Daryabar, Farid |
| building | UPM Institutional Repository |
| collection | Online Access |
| description | Nowadays, malware attacks are the most expensive damages for organizations in different types of computer and network systems. While different types of attacks are well surveyed and documented, little details related to bypass malware detections and defenses are provided in the
public domains. Malware caused different types of attacks such as denial of service (DoS) attacks,business espionage, extorting money, etc. Therefore, implementing malware defenses for organizations’ internal networks are uttermost important.In this paper, bypassing the well-known and unknown malware through the host-based Anti Viruses (AVs) that are based on signature detection is illustrated, and it is shown that how even a known malware might be bypassed anti viruses and firewalls to be executed in organizations’
internal computer networks. Right after that, an unknown malware detection system to protect organization’s internal networks from unknown and known malware before they reach into the victims’ systems is surveyed and provided. |
| first_indexed | 2025-11-15T09:07:12Z |
| format | Article |
| id | upm-30589 |
| institution | Universiti Putra Malaysia |
| institution_category | Local University |
| language | English |
| last_indexed | 2025-11-15T09:07:12Z |
| publishDate | 2013 |
| publisher | Advanced Institute of Convergence Information Technology |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | upm-305892015-10-06T07:43:53Z http://psasir.upm.edu.my/id/eprint/30589/ Analysis of known and unknown malware bypassing techniques Daryabar, Farid Dehghantanha, Ali Udzir, Nur Izura Mohd Sani, Nor Fazlida Shamsuddin, Solahuddin Norouzizadeh, Farhood Nowadays, malware attacks are the most expensive damages for organizations in different types of computer and network systems. While different types of attacks are well surveyed and documented, little details related to bypass malware detections and defenses are provided in the public domains. Malware caused different types of attacks such as denial of service (DoS) attacks,business espionage, extorting money, etc. Therefore, implementing malware defenses for organizations’ internal networks are uttermost important.In this paper, bypassing the well-known and unknown malware through the host-based Anti Viruses (AVs) that are based on signature detection is illustrated, and it is shown that how even a known malware might be bypassed anti viruses and firewalls to be executed in organizations’ internal computer networks. Right after that, an unknown malware detection system to protect organization’s internal networks from unknown and known malware before they reach into the victims’ systems is surveyed and provided. Advanced Institute of Convergence Information Technology 2013-09 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/30589/1/Analysis%20of%20known%20and%20unknown%20malware%20bypassing%20techniques.pdf Daryabar, Farid and Dehghantanha, Ali and Udzir, Nur Izura and Mohd Sani, Nor Fazlida and Shamsuddin, Solahuddin and Norouzizadeh, Farhood (2013) Analysis of known and unknown malware bypassing techniques. International Journal of Information Processing and Management, 4 (6). pp. 50-59. ISSN 2093-4009; ESSN: 2233-940X http://www.aicit.org/ijipm/global/paper_detail.html?jname=IJIPM&q=229 |
| spellingShingle | Daryabar, Farid Dehghantanha, Ali Udzir, Nur Izura Mohd Sani, Nor Fazlida Shamsuddin, Solahuddin Norouzizadeh, Farhood Analysis of known and unknown malware bypassing techniques |
| title | Analysis of known and unknown malware bypassing techniques |
| title_full | Analysis of known and unknown malware bypassing techniques |
| title_fullStr | Analysis of known and unknown malware bypassing techniques |
| title_full_unstemmed | Analysis of known and unknown malware bypassing techniques |
| title_short | Analysis of known and unknown malware bypassing techniques |
| title_sort | analysis of known and unknown malware bypassing techniques |
| url | http://psasir.upm.edu.my/id/eprint/30589/ http://psasir.upm.edu.my/id/eprint/30589/ http://psasir.upm.edu.my/id/eprint/30589/1/Analysis%20of%20known%20and%20unknown%20malware%20bypassing%20techniques.pdf |