Abstract

Most recent cyberattacks have employed new and diverse malware. Various static and dynamic analysis methods are being introduced to detect and defend against these attacks. The malware that is detected by these methods includes advanced present threat (APT) attacks, which allow additional intervention by attackers. Such malware presents a variety of threats (DNS, C&C, Malicious IP, etc.) This threat information used to defend against variants of malicious attacks. However, the intelligence that is detected in this manner is used in the blocking policies of information-security systems. Consequently, it is difficult for staff who perform Computer Emergence Response Team security control to determine the extent to which cyberattacks such as malware are a potential threat. Additionally, it is difficult to use this intelligence to establish long-term defense strategies for specific APT attacks or implement intelligent internal security systems. Therefore, a decision-making model that identifies threat sources and malicious activities (MAs) that occur during the static and dynamic analysis of various types of collected malware and performs machine learning based on a quantitative analysis of these threat sources and activities is proposed herein. This model estimates malware risk indices (MRIs) in detail using an analytic hierarchy process to analyze malware and the probabilities of MAs. The analysis results were significant, as the consistency index of the estimated MRI values for 51300 types of malware, which were collected during a specific control period, was maintained at <0.051.

Highlights

  • Cyberattacks are becoming more diverse, sophisticated, targeted, and specialized.Such advanced persistent threats (APTs) [1,2,3] require detailed defense strategies

  • It provides the ultimate priority order results within these periods. This result value is actively used in intelligent responses during cybersecurity control. It is used as intelligence information in information-security solutions (UTM, Anti-Virus, APT, etc.) The ultimate training transition matrices of the malicious activities (MAs) (MAn ) that are learned according to the weight values of each malware (MCn ) collected during a certain period are defined as follows

  • The sandbox environment was created as a VirtualBox [38], which is a type of virtual machine

Read more

Summary

Introduction

Cyberattacks are becoming more diverse, sophisticated, targeted, and specialized. The usual Computer Emergence Response Team (CERT) places a high priority on updating its information-protection solution patterns to immediately eliminate malicious codes that are detected This makes it difficult for an attacker to collect information from the target over a long period of time and conduct a related analysis regarding additional cyberattacks. This is because if the type of malware detected during static/dynamic analysis of malicious code is reclassified, and the malicious activities (MAs) [14] involved are identified and quantified, the purpose, means, and strategy of an attacker attacking his/her organization can be inferred This is a critical process for improving the organization’s information protection system and establishing an intelligent cyber defense strategy.

Related Studies
Quantitative Hierarchy Analysis of Malware and Its MAs
The classified in in
Vector of Criteria Weights andmc
Threat Level of MRI
Creating Experimental Environment
Final MRI
Difference
Threats to Validity
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.