Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Cybersecurity: timeline malware analysis and classification

Cybersecurity: timeline malware analysis and classification

For access to this article, please select a purchase option:

Buy chapter PDF
£10.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Information Security: Foundations, Technologies and Applications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this chapter, we address the introduction to cybersecurity and problems associated with cybersecurity in particular malicious activities in cyber space. The proliferation and exponential increase of malware has continued to present a serious threat to the security of information systems. Furthermore, with the development of evermore sophisticated methods of evading detection, malware has posed serious challenges to combat it. Moreover, due to the continuous changes in malware design, antimalware (AM) strategy that has been successful in a given time period will not work at a much later date. In this chapter, we propose the challenges of malware in cyberspace and its detection approach called cumulative timeline analysis (CTA) that retains high accuracy over an extended time period. The effectiveness of the proposed approach is tested on malware executables collected over a span of 10 years with almost constant accuracy.

Chapter Contents:

  • 10.1 Introduction
  • 10.1.1 Significance
  • 10.1.2 Problems
  • 10.2 Timeline malware analysis and classification
  • 10.3 Related work
  • 10.4 Malware sample collection
  • 10.4.1 The methodology
  • 10.4.2 Data collection
  • 10.5 Cumulative timeline analysis
  • 10.5.1 CTA data preprocessing
  • 10.5.2 CTA feature vector generation
  • 10.5.2.1 Static vector generation
  • 10.5.2.2 Dynamic vector generation
  • 10.6 CTA malware detection method
  • 10.6.1 Environment
  • 10.6.2 Evaluation process
  • 10.7 Experiments and results
  • 10.7.1 Timeline classification results using FLF features
  • 10.7.2 Timeline classification results using PSI features
  • 10.7.3 Timeline classification results using dynamic features
  • 10.8 Conclusions and future work
  • References

Inspec keywords: information systems; invasive software

Other keywords: cybersecurity; serious threat; timeline malware analysis; information systems; cyber space; cumulative timeline analysis; malicious activities

Subjects: Data security

Preview this chapter:
Zoom in
Zoomout

Cybersecurity: timeline malware analysis and classification, Page 1 of 2

| /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch10-1.gif /docserver/preview/fulltext/books/sc/pbse001e/PBSE001E_ch10-2.gif

Related content

content/books/10.1049/pbse001e_ch10
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address