2023
DOI: 10.3390/app13052894
|View full text |Cite
|
Sign up to set email alerts
|

Classification and Analysis of Malicious Code Detection Techniques Based on the APT Attack

Abstract: According to the Fire-eye’s M-Trends Annual Threat Report 2022, there are many advanced persistent threat (APT) attacks that are currently in use, and such continuous and specialized APT attacks cause serious damages attacks. As APT attacks continue to be active, there is a need for countermeasures to detect new and existing malicious codes. An APT attack is a type of intelligent attack that analyzes the target and exploits its vulnerabilities. It attempts to achieve a specific purpose, and is persistent in co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 90 publications
0
3
0
Order By: Relevance
“…The principal limitation of signature-based systems lies in their inherent dependency on known threat databases. This characteristic renders them notably inadequate in detecting novel or heavily obfuscated malware variants that deviate from recognized patterns (Haidros Rahima Lee et al 2023).…”
Section: Review On Detection Approaches Of Obfuscated Malware In Memo...mentioning
confidence: 99%
“…The principal limitation of signature-based systems lies in their inherent dependency on known threat databases. This characteristic renders them notably inadequate in detecting novel or heavily obfuscated malware variants that deviate from recognized patterns (Haidros Rahima Lee et al 2023).…”
Section: Review On Detection Approaches Of Obfuscated Malware In Memo...mentioning
confidence: 99%
“…Code injection attacks commonly target pre-existing data vulnerabilities, such as insecure manipulation of data from untrusted sources. (Lee et al, 2023) Insider Threats An insider threat refers to a cyberattack that is initiated by an individual who is employed by an organization or has authorized access to its networks or systems. An insider threat refers to an individual who poses a risk to an organization's security and can include current or former employees, consultants, board members, or business partners.…”
Section: Code Injection Attacksmentioning
confidence: 99%
“…Attackers are known to use valid websites and injecting malware into them which may include links, iFrames, JavaScript codes, cross site scripts and redirects [46]. Malicious code is injected into the browser when users visit infected pages, which then scans the system for vulnerabilities [47], [48]. This form of attack is prevented by regular scanning of the system, removing unwanted plug-ins and software, using web filters and firewalls.…”
Section: Drive By Downloadmentioning
confidence: 99%