Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks

Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant r...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Shiva Darshan, Manoj Kumar, Prashanth, Vishnu Srinivasa Murthy
Format: Buchkapitel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 312
container_issue
container_start_page 285
container_title
container_volume
creator Shiva Darshan
Manoj Kumar
Prashanth
Vishnu Srinivasa Murthy
description Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in Cyber-Physical Systems focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in real time. Covering topics such as intrusion detection systems, low-cost manufacturing, and surveillance robots, this premier reference source is essential for cyber security professionals, computer scientists, students and educators of higher education, researchers, and academicians.
doi_str_mv 10.4018/978-1-6684-8666-5.ch013
format Book Chapter
fullrecord <record><control><sourceid>igi</sourceid><recordid>TN_cdi_igi_books_10_4018_978-1-6684-8666-5_ch013</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10.4018/978-1-6684-8666-5.ch013</sourcerecordid><originalsourceid>FETCH-LOGICAL-i111t-ea04fbc0559eaac0066e4a9990f305f8bf139f9f50d5efe904fd0f34b27015e53</originalsourceid><addsrcrecordid>eNplkMtOwzAURC0hJKD0G_APuNybxK7NLoooryIWwDpynOtiGsVVbKni72mBHauRzoxmcRi7QlhUgPraLLVAoZSuhFZKCblwH4DlCbvAIzwyOGPzlD4BoNAAWhbn7PHZDns7EV_FicYUXLrh9cjr3W4IzuYQRx49f3WBxhx8cPxpjPuB-g3xHHnz1dHE65yt26ZLdurtkGj-lzP2vrp9a-7F-uXuoanXIiBiFmSh8p0DKQ1Z6wCUosoaY8CXIL3uPJbGGy-hl-TJHNb9oaq6YgkoSZYzBr-_YRPaLsZtahHao4P2n4P2x0H5Db6bUM4</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype></control><display><type>book_chapter</type><title>Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks</title><source>InfoSci-Books</source><creator>Shiva Darshan ; Manoj Kumar ; Prashanth ; Vishnu Srinivasa Murthy</creator><creatorcontrib>Shiva Darshan ; Manoj Kumar ; Prashanth ; Vishnu Srinivasa Murthy</creatorcontrib><description>Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in Cyber-Physical Systems focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in real time. Covering topics such as intrusion detection systems, low-cost manufacturing, and surveillance robots, this premier reference source is essential for cyber security professionals, computer scientists, students and educators of higher education, researchers, and academicians.</description><identifier>ISBN: 1668486660</identifier><identifier>ISBN: 9781668486665</identifier><identifier>DOI: 10.4018/978-1-6684-8666-5.ch013</identifier><language>eng</language><publisher>IGI Global</publisher><subject>Cyber and Network Security ; LCSH: Malware (Computer software) ; Prevention. | Intrusion ; Security &amp; Forensics ; Systems &amp; Software Design</subject><ispartof>Malware Analysis and Intrusion Detection in Cyber-Physical Systems, 2023, p.285-312</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://coverimages.igi-global.com/cover-images/covers/9781668486665.png</thumbnail><link.rule.ids>779,780,784,793,23137,27924</link.rule.ids></links><search><creatorcontrib>Shiva Darshan</creatorcontrib><creatorcontrib>Manoj Kumar</creatorcontrib><creatorcontrib>Prashanth</creatorcontrib><creatorcontrib>Vishnu Srinivasa Murthy</creatorcontrib><title>Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks</title><title>Malware Analysis and Intrusion Detection in Cyber-Physical Systems</title><description>Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in Cyber-Physical Systems focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in real time. Covering topics such as intrusion detection systems, low-cost manufacturing, and surveillance robots, this premier reference source is essential for cyber security professionals, computer scientists, students and educators of higher education, researchers, and academicians.</description><subject>Cyber and Network Security</subject><subject>LCSH: Malware (Computer software)</subject><subject>Prevention. | Intrusion</subject><subject>Security &amp; Forensics</subject><subject>Systems &amp; Software Design</subject><isbn>1668486660</isbn><isbn>9781668486665</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2023</creationdate><recordtype>book_chapter</recordtype><sourceid/><recordid>eNplkMtOwzAURC0hJKD0G_APuNybxK7NLoooryIWwDpynOtiGsVVbKni72mBHauRzoxmcRi7QlhUgPraLLVAoZSuhFZKCblwH4DlCbvAIzwyOGPzlD4BoNAAWhbn7PHZDns7EV_FicYUXLrh9cjr3W4IzuYQRx49f3WBxhx8cPxpjPuB-g3xHHnz1dHE65yt26ZLdurtkGj-lzP2vrp9a-7F-uXuoanXIiBiFmSh8p0DKQ1Z6wCUosoaY8CXIL3uPJbGGy-hl-TJHNb9oaq6YgkoSZYzBr-_YRPaLsZtahHao4P2n4P2x0H5Db6bUM4</recordid><startdate>20230926</startdate><enddate>20230926</enddate><creator>Shiva Darshan</creator><creator>Manoj Kumar</creator><creator>Prashanth</creator><creator>Vishnu Srinivasa Murthy</creator><general>IGI Global</general><scope/></search><sort><creationdate>20230926</creationdate><title>Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks</title><author>Shiva Darshan ; Manoj Kumar ; Prashanth ; Vishnu Srinivasa Murthy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i111t-ea04fbc0559eaac0066e4a9990f305f8bf139f9f50d5efe904fd0f34b27015e53</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cyber and Network Security</topic><topic>LCSH: Malware (Computer software)</topic><topic>Prevention. | Intrusion</topic><topic>Security &amp; Forensics</topic><topic>Systems &amp; Software Design</topic><toplevel>online_resources</toplevel><creatorcontrib>Shiva Darshan</creatorcontrib><creatorcontrib>Manoj Kumar</creatorcontrib><creatorcontrib>Prashanth</creatorcontrib><creatorcontrib>Vishnu Srinivasa Murthy</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shiva Darshan</au><au>Manoj Kumar</au><au>Prashanth</au><au>Vishnu Srinivasa Murthy</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks</atitle><btitle>Malware Analysis and Intrusion Detection in Cyber-Physical Systems</btitle><date>2023-09-26</date><risdate>2023</risdate><spage>285</spage><epage>312</epage><pages>285-312</pages><isbn>1668486660</isbn><isbn>9781668486665</isbn><abstract>Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in Cyber-Physical Systems focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in real time. Covering topics such as intrusion detection systems, low-cost manufacturing, and surveillance robots, this premier reference source is essential for cyber security professionals, computer scientists, students and educators of higher education, researchers, and academicians.</abstract><pub>IGI Global</pub><doi>10.4018/978-1-6684-8666-5.ch013</doi><tpages>28</tpages></addata></record>
fulltext fulltext
identifier ISBN: 1668486660
ispartof Malware Analysis and Intrusion Detection in Cyber-Physical Systems, 2023, p.285-312
issn
language eng
recordid cdi_igi_books_10_4018_978-1-6684-8666-5_ch013
source InfoSci-Books
subjects Cyber and Network Security
LCSH: Malware (Computer software)
Prevention. | Intrusion
Security & Forensics
Systems & Software Design
title Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T22%3A19%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-igi&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Malware%20Forensics:%20An%20Application%20of%20Scientific%20Knowledge%20to%20Cyber%20Attacks&rft.btitle=Malware%20Analysis%20and%20Intrusion%20Detection%20in%20Cyber-Physical%20Systems&rft.au=Shiva%20Darshan&rft.date=2023-09-26&rft.spage=285&rft.epage=312&rft.pages=285-312&rft.isbn=1668486660&rft.isbn_list=9781668486665&rft_id=info:doi/10.4018/978-1-6684-8666-5.ch013&rft_dat=%3Cigi%3E10.4018/978-1-6684-8666-5.ch013%3C/igi%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true