Cyber attacks are currently blooming, as the attackers reap significant profits from them and face a limited risk when compared to committing the "classical" crimes. One of the major components that leads to the successful compromising of the targeted system is malicious software. It allows using the victim's machine for various nefarious purposes, e.g., making it a part of the botnet, mining cryptocurrencies, or holding hostage the data stored there. At present, the complexity, proliferation, and variety of malware pose a real challenge for the existing countermeasures and require their constant improvements. That is why, in this paper we first perform a detailed meta-review of the existing surveys related to malware and its detection techniques. On this basis, we review the evolution of modern threats in the communication networks and we present the bird's eye view portraying the main development trends in detection methods with a special emphasis on the machine learning techniques.

Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection

L Caviglione;
2021

Abstract

Cyber attacks are currently blooming, as the attackers reap significant profits from them and face a limited risk when compared to committing the "classical" crimes. One of the major components that leads to the successful compromising of the targeted system is malicious software. It allows using the victim's machine for various nefarious purposes, e.g., making it a part of the botnet, mining cryptocurrencies, or holding hostage the data stored there. At present, the complexity, proliferation, and variety of malware pose a real challenge for the existing countermeasures and require their constant improvements. That is why, in this paper we first perform a detailed meta-review of the existing surveys related to malware and its detection techniques. On this basis, we review the evolution of modern threats in the communication networks and we present the bird's eye view portraying the main development trends in detection methods with a special emphasis on the machine learning techniques.
2021
Istituto di Matematica Applicata e Tecnologie Informatiche - IMATI -
malware
detection
machine learning
information hiding
cybersecurity
File in questo prodotto:
File Dimensione Formato  
prod_440980-doc_158269.pdf

solo utenti autorizzati

Descrizione: Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
Tipologia: Versione Editoriale (PDF)
Dimensione 469.05 kB
Formato Adobe PDF
469.05 kB Adobe PDF   Visualizza/Apri   Richiedi una copia
prod_440980-doc_158559.pdf

solo utenti autorizzati

Descrizione: Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
Tipologia: Versione Editoriale (PDF)
Dimensione 914.55 kB
Formato Adobe PDF
914.55 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.14243/421175
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 121
  • ???jsp.display-item.citation.isi??? 76
social impact