Title :
An offensive containment strategy based on Malware´s attack patterns
Author :
Pan, Jeng-Shyang ; Chun Che Fung
Author_Institution :
Sch. of Eng. & Inf. Technol., Murdoch Univ., Perth, WA, Australia
Abstract :
Malware has become a major problem to organizations and they are becoming more sophisticated in many ways. They have abilities to penetrate through deployed defensive measures and stay active while resisting containment responses. Malware are also evading and attacking the defenses put up by organizations. The classical containment techniques to contain a successful infiltration of Malware have limited effectiveness against the determined and resilient malice. This paper advocates using the offensive techniques typically used by Malware to disable them as part of the containment response. In this paper, two experiments involving the application of offensive techniques on different Malware are presented. One of which involves a smartphone Malware. The result of this experiments demonstrate applicability of such techniques as part of containment response.
Keywords :
invasive software; containment response; malware attack patterns; malware containment techniques; offensive containment strategy; offensive techniques; smart phone malware; Abstracts; Educational institutions; Malware; Manuals; Ports (Computers); Malware Remediation; Offensive Containment;
Conference_Titel :
Machine Learning and Cybernetics (ICMLC), 2013 International Conference on
Conference_Location :
Tianjin
DOI :
10.1109/ICMLC.2013.6890860