A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions (English)

In: IEEE Communications Surveys & Tutorials   ;  19 ,  2  ;  1145-1172  ;  2017

How to get this document?

Download
Commercial Copyright fee: €28.50 Basic fee: €4.00 Total price: €32.50
Academic Copyright fee: €28.50 Basic fee: €2.00 Total price: €30.50

As our professional, social, and financial existences become increasingly digitized and as our government, healthcare, and military infrastructures rely more on computer technologies, they present larger and more lucrative targets for malware. Stealth malware in particular poses an increased threat because it is specifically designed to evade detection mechanisms, spreading dormant, in the wild for extended periods of time, gathering sensitive information or positioning itself for a high-impact zero-day attack. Policing the growing attack surface requires the development of efficient anti-malware solutions with improved generalization to detect novel types of malware and resolve these occurrences with as little burden on human experts as possible. In this paper, we survey malicious stealth technologies as well as existing solutions for detecting and categorizing these countermeasures autonomously. While machine learning offers promising potential for increasingly autonomous solutions with improved generalization to new malware types, both at the network level and at the host level, our findings suggest that several flawed assumptions inherent to most recognition algorithms prevent a direct mapping between the stealth malware recognition problem and a machine learning solution. The most notable of these flawed assumptions is the closed world assumption: that no sample belonging to a class outside of a static training set will appear at query time. We present a formalized adaptive open world framework for stealth malware recognition and relate it mathematically to research from other machine learning domains.

  • Title:
    A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions
  • Author / Creator:
  • Published in:
  • Publisher:
    IEEE
  • Year of publication:
    2017
  • Size:
    1689284 byte
  • ISSN:
  • DOI:
  • Type of media:
    Article (Journal)
  • Type of material:
    Electronic Resource
  • Language:
    English
  • Source:
  • Export:
  • ORKG:

Table of contents – Volume 19, Issue 2

Show all volumes and issues

The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.

682
Editorial: Second Quarter 2017 IEEE Communications Surveys and Tutorials
Lin, Ying-Dar | 2017
688
5G: Adaptable Networks Enabled by Versatile Radio Access Technologies
Sexton, Conor / Kaminski, Nicholas J. / Marquez-Barja, Johann M. / Marchetti, Nicola / DaSilva, Luiz A. | 2017
721
Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges
Riazul Islam, S. M. / Avazov, Nurilla / Dobre, Octavia A. / Kyung-sup Kwak, | 2017
743
Coordinated Multi-Point Clustering Schemes: A Survey
Bassoy, Selcuk / Farooq, Hasan / Imran, Muhammad A. / Imran, Ali | 2017
765
Jammer Localization in Multi-Hop Wireless Network: A Comprehensive Survey
Xianglin Wei, / Qiping Wang, / Tongxiang Wang, / Jianhua Fan, | 2017
800
Void-Handling Techniques for Routing Protocols in Underwater Sensor Networks: Survey and Challenges
Ghoreyshi, Seyed Mohammad / Shahrabi, Alireza / Boutaleb, Tuleen | 2017
828
A Survey of Network Lifetime Maximization Techniques in Wireless Sensor Networks
Yetgin, Halil / Cheung, Kent Tsz Kan / El-Hajjar, Mohammed / Hanzo, Lajos | 2017
855
Low Power Wide Area Networks: An Overview
Raza, Usman / Kulkarni, Parag / Sooriyabandara, Mahesh | 2017
874
An Ultra Wideband Survey: Global Regulations and Impulse Radio Research Based on Standards
Niemela, Ville / Haapola, Jussi / Hamalainen, Matti / Iinatti, Jari | 2017
891
A Survey on Large-Scale Software Defined Networking (SDN) Testbeds: Approaches and Challenges
Tao Huang, / Yu, F. Richard / Chen Zhang, / Jiang Liu, / Jiao Zhang, / Yunjie Liu, | 2017
918
A Survey on the Contributions of Software-Defined Networking to Traffic Engineering
Mendiola, Alaitz / Astorga, Jasone / Jacob, Eduardo / Higuero, Marivi | 2017
954
Resource Management in Cloud Networking Using Economic Analysis and Pricing Models: A Survey
Nguyen Cong Luong, / Ping Wang, / Niyato, Dusit / Yonggang Wen, / Zhu Han, | 2017
1002
A Survey on Replica Server Placement Algorithms for Content Delivery Networks
Sahoo, Jagruti / Salahuddin, Mohammad A. / Glitho, Roch / Elbiaze, Halima / Ajib, Wessam | 2017
1027
A Survey on Multiple-Antenna Techniques for Physical Layer Security
Xiaoming Chen, / Wing Kwan Ng, Derrick / Gerstacker, Wolfgang H. / Hsiao-Hwa Chen, | 2017
1054
Security and Privacy in Device-to-Device (D2D) Communication: A Review
Haus, Michael / Waqas, Muhammad / Ding, Aaron Yi / Yong Li, / Tarkoma, Sasu / Ott, Jorg | 2017
1080
Social Authentication Applications, Attacks, Defense Strategies and Future Research Directions: A Systematic Review
Alomar, Noura / Alsaleh, Mansour / Alarifi, Abdulrahman | 2017
1112
Network-Based Secret Communication in Clouds: A Survey
Ullrich, Johanna / Zseby, Tanja / Fabini, Joachim / Weippl, Edgar | 2017
1145
A Survey of Stealth Malware Attacks, Mitigation Measures, and Steps Toward Autonomous Open World Solutions
Rudd, Ethan M. / Rozsa, Andras / Gunther, Manuel / Boult, Terrance E. | 2017
1173
Network Utility Maximization-Based Congestion Control Over Wireless Networks: A Survey and Potential Directives
Quoc-Viet Pham, / Won-Joo Hwang, | 2017
1201
Instantly Decodable Network Coding: From Centralized to Device-to-Device Communications
Douik, Ahmed / Sorour, Sameh / Al-Naffouri, Tareq Y. / Alouini, Mohamed-Slim | 2017
1225
Sequence Sets in Wireless Communication Systems: A Survey
Velazquez-Gutierrez, Juan M. / Vargas-Rosales, Cesar | 2017
1249
Resource Allocation for Underlay Cognitive Radio Networks: A Survey
El Tanab, Manal / Hamouda, Walaa | 2017
1277
Advances on Spectrum Sensing for Cognitive Radio Networks: Theory and Applications
Ali, Abdelmohsen / Hamouda, Walaa | 2017
1305
Graph Data Anonymization, De-Anonymization Attacks, and De-Anonymizability Quantification: A Survey
Shouling Ji, / Mittal, Prateek / Beyah, Raheem | 2017
1327
Recent Advances in Indoor Localization: A Survey on Theoretical Approaches and Applications
Yassin, Ali / Nasser, Youssef / Awad, Mariette / Al-Dubai, Ahmed / Ran Liu, / Chau Yuen, / Raulefs, Ronald / Aboutanios, Elias | 2017
1347
A Survey of Selected Indoor Positioning Methods for Smartphones
Davidson, Pavel / Piche, Robert | 2017
C1
Table of contents
| 2017