Cyber attacks are currently blooming, as the attackers reap significant profits from them and face a limited risk when compared to committing the "classical" crimes. One of the major components that leads to the successful compromising of the targeted system is malicious software. It allows using the victim's machine for various nefarious purposes, e.g., making it a part of the botnet, mining cryptocurrencies, or holding hostage the data stored there. At present, the complexity, proliferation, and variety of malware pose a real challenge for the existing countermeasures and require their constant improvements. That is why, in this paper we first perform a detailed meta-review of the existing surveys related to malware and its detection techniques. On this basis, we review the evolution of modern threats in the communication networks and we present the bird's eye view portraying the main development trends in detection methods with a special emphasis on the machine learning techniques.
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
L Caviglione;
2021
Abstract
Cyber attacks are currently blooming, as the attackers reap significant profits from them and face a limited risk when compared to committing the "classical" crimes. One of the major components that leads to the successful compromising of the targeted system is malicious software. It allows using the victim's machine for various nefarious purposes, e.g., making it a part of the botnet, mining cryptocurrencies, or holding hostage the data stored there. At present, the complexity, proliferation, and variety of malware pose a real challenge for the existing countermeasures and require their constant improvements. That is why, in this paper we first perform a detailed meta-review of the existing surveys related to malware and its detection techniques. On this basis, we review the evolution of modern threats in the communication networks and we present the bird's eye view portraying the main development trends in detection methods with a special emphasis on the machine learning techniques.| File | Dimensione | Formato | |
|---|---|---|---|
|
prod_440980-doc_158269.pdf
solo utenti autorizzati
Descrizione: Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
Tipologia:
Versione Editoriale (PDF)
Dimensione
469.05 kB
Formato
Adobe PDF
|
469.05 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
|
prod_440980-doc_158559.pdf
solo utenti autorizzati
Descrizione: Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
Tipologia:
Versione Editoriale (PDF)
Dimensione
914.55 kB
Formato
Adobe PDF
|
914.55 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.


