DocumentCode
693227
Title
An offensive containment strategy based on Malware´s attack patterns
Author
Pan, Jeng-Shyang ; Chun Che Fung
Author_Institution
Sch. of Eng. & Inf. Technol., Murdoch Univ., Perth, WA, Australia
Volume
04
fYear
2013
fDate
14-17 July 2013
Firstpage
1631
Lastpage
1636
Abstract
Malware has become a major problem to organizations and they are becoming more sophisticated in many ways. They have abilities to penetrate through deployed defensive measures and stay active while resisting containment responses. Malware are also evading and attacking the defenses put up by organizations. The classical containment techniques to contain a successful infiltration of Malware have limited effectiveness against the determined and resilient malice. This paper advocates using the offensive techniques typically used by Malware to disable them as part of the containment response. In this paper, two experiments involving the application of offensive techniques on different Malware are presented. One of which involves a smartphone Malware. The result of this experiments demonstrate applicability of such techniques as part of containment response.
Keywords
invasive software; containment response; malware attack patterns; malware containment techniques; offensive containment strategy; offensive techniques; smart phone malware; Abstracts; Educational institutions; Malware; Manuals; Ports (Computers); Malware Remediation; Offensive Containment;
fLanguage
English
Publisher
ieee
Conference_Titel
Machine Learning and Cybernetics (ICMLC), 2013 International Conference on
Conference_Location
Tianjin
Type
conf
DOI
10.1109/ICMLC.2013.6890860
Filename
6890860
Link To Document