Browse > Article
http://dx.doi.org/10.3837/tiis.2019.03.028

A Study on Analysis of Malicious Code Behavior Information for Predicting Security Threats in New Environments  

Choi, Seul-Ki (ISAA Lab., Department of Computer Engineering, Ajou University)
Lee, Taejin (Department of Computer Engineering, Hoseo University)
Kwak, Jin (Department of Cyber Security, Ajou University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.3, 2019 , pp. 1611-1625 More about this Journal
Abstract
The emergence of new technologies and devices brings a new environment in the field of cyber security. It is not easy to predict possible security threats about new environment every time without special criteria. In other words, most malicious codes often reuse malicious code that has occurred in the past, such as bypassing detection from anti-virus or including additional functions. Therefore, we are predicting the security threats that can arise in a new environment based on the history of repeated malicious code. In this paper, we classify and define not only the internal information obtained from malicious code analysis but also the features that occur during infection and attack. We propose a method to predict and manage security threats in new environment by continuously managing and extending.
Keywords
Cyber security; Malicious code; Malware; Security threat;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Somia Sahraoui and Azeddine Bilami, "Asymmetric End-to-End Security for Human-to-Thing Communications in the Internet of Things," in Proc. of IoT'16 Proceedings of the 6th International Conference on the Internet of Things, pp.131-139, November 07-09, 2016.
2 Meesun Kim, Hyun Ahn and Kwanghoon Pio Kim, "Process-Aware Internet of Things: A Conceptual Extension of the Internet of Things Framework and Architecture," KSII Transactions on Internet and Information Systems, vol. 10, no. 8, August 31, 2016.
3 Vu-Anh-Quang Nguyen, "Study on realtime control system in IoT based smart factory: Interference awareness, architectural elements, and its application," in Proc. of Information Science and Technology (ICIST), 2017 Seventh International Conference on, April 16-19, 2017.
4 H. Arasteh, V. Hosseinnezhad, V. Loia, A. Tommasetti, O. Troisi, M. Shafie-khah and P. Siano, "Iot-based Smart Cities: A Survey," in Proc. of Environment and Electrical Engineering (EEEIC), 2016 IEEE 16th International Conference on, June 7-10, 2016.
5 Jorge Alfonso, Nuria Sanchez, Jose Manuel Menendez and Emilio Cacheiro, "Cooperative ITS communications architecture: the FOTsis project approach and beyond," IET Intelligent Transport System, vol. 9, issue. 6, pp.591-598, August 06, 2015.   DOI
6 McAfee Labs, McAfee Labs Threats Report September 2018, September, 2018.
7 Taejin Lee and Jin Kwak, "Effective and Reliable Malware Group Classification for a Massive Malware Environment," International Journal of Distributed Sensor Networks, Hindawi Publishing Corporation, Volume 2016, 2016.
8 Ahmad Karim, Syed Adeel Ali Shah, Rosli Bin Salleh, Muhammad Arif, Rafidah Md Noor and Shahaboddin Shamshirband, "Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues," KSII Transactions on Internet and Information Systems, vol. 9, no.4, April 30, 2015.
9 James A. Jerkins, "Motivating a market or regulatory solution to IoT insecurity with the Mirai botnet code," in Proc. of Computing and Communication Workshop and Conference (CCWC), 2017 IEEE 7th Annual, January 09-11, 2017.
10 Ahmed El-Kosairy and Marianne A. Azer, "Intrusion and ransomware detection system," in Proc. of 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), September 27, 2018.
11 Taejin Lee, Bomin Choi, Youngsang Shin and Jin Kwak, "Automatic malware mutant detection and group classification based on the n-gram and clustering coefficient," The Journal of Supercomputing, Springer, 18 December, 2015.
12 Zhang Fuyong and Zhao Tiezhu, "Malware Detection and Classification Based on ngrams Attribute Similarity," in Proc. of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), 21 July, 2017.
13 Arzu Gorgulu Kakisim, Mert Nar, Necmettin Carkaci and Ibrahim Sogukpinar, "Analysis and Evaluation of Dynamic Feature-Based Malware Detection Methods," Innovative Security Solutions for Information Technology and Communications (SECITC 2018), pp 247-258, Feb, 2019.