DocumentCode :
1989683
Title :
Patterns in malware designed for data espionage and backdoor creation
Author :
Javed, A. ; Akhlaq, M.
Author_Institution :
Nat. Univ. of Sci. & Technol., Islamabad, Pakistan
fYear :
2015
fDate :
13-17 Jan. 2015
Firstpage :
338
Lastpage :
342
Abstract :
In the recent past, malware have become a serious cyber security threat which has not only targeted individuals and organizations but has also threatened the cyber space of countries around the world. Amongst malware variants, trojans designed for data espionage and backdoor creation dominates the threat landscape. This necessitates an in depth study of these malware with the scope of extracting static features like APIs, strings, IP Addresses, URLs, email addresses etc. by and large found in such malicious codes. Hence in this research paper, an endeavor has been made to establish a set of patterns, tagged as APIs and Malicious Strings persistently existent in these malware by articulating an analysis framework.
Keywords :
application program interfaces; feature extraction; invasive software; APIs; backdoor creation; cyber security threat; data espionage; malicious codes; malicious strings; malware; static feature extraction; trojans; Accuracy; Feature extraction; Lead; Malware; Sensitivity;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Applied Sciences and Technology (IBCAST), 2015 12th International Bhurban Conference on
Conference_Location :
Islamabad
Type :
conf
DOI :
10.1109/IBCAST.2015.7058526
Filename :
7058526
Link To Document :
بازگشت