Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks
Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant r...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 312 |
---|---|
container_issue | |
container_start_page | 285 |
container_title | |
container_volume | |
creator | Shiva Darshan Manoj Kumar Prashanth Vishnu Srinivasa Murthy |
description | Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in Cyber-Physical Systems focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in real time. Covering topics such as intrusion detection systems, low-cost manufacturing, and surveillance robots, this premier reference source is essential for cyber security professionals, computer scientists, students and educators of higher education, researchers, and academicians. |
doi_str_mv | 10.4018/978-1-6684-8666-5.ch013 |
format | Book Chapter |
fullrecord | <record><control><sourceid>igi</sourceid><recordid>TN_cdi_igi_books_10_4018_978-1-6684-8666-5_ch013</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10.4018/978-1-6684-8666-5.ch013</sourcerecordid><originalsourceid>FETCH-LOGICAL-i111t-ea04fbc0559eaac0066e4a9990f305f8bf139f9f50d5efe904fd0f34b27015e53</originalsourceid><addsrcrecordid>eNplkMtOwzAURC0hJKD0G_APuNybxK7NLoooryIWwDpynOtiGsVVbKni72mBHauRzoxmcRi7QlhUgPraLLVAoZSuhFZKCblwH4DlCbvAIzwyOGPzlD4BoNAAWhbn7PHZDns7EV_FicYUXLrh9cjr3W4IzuYQRx49f3WBxhx8cPxpjPuB-g3xHHnz1dHE65yt26ZLdurtkGj-lzP2vrp9a-7F-uXuoanXIiBiFmSh8p0DKQ1Z6wCUosoaY8CXIL3uPJbGGy-hl-TJHNb9oaq6YgkoSZYzBr-_YRPaLsZtahHao4P2n4P2x0H5Db6bUM4</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>book_chapter</recordtype></control><display><type>book_chapter</type><title>Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks</title><source>InfoSci-Books</source><creator>Shiva Darshan ; Manoj Kumar ; Prashanth ; Vishnu Srinivasa Murthy</creator><creatorcontrib>Shiva Darshan ; Manoj Kumar ; Prashanth ; Vishnu Srinivasa Murthy</creatorcontrib><description>Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in Cyber-Physical Systems focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in real time. Covering topics such as intrusion detection systems, low-cost manufacturing, and surveillance robots, this premier reference source is essential for cyber security professionals, computer scientists, students and educators of higher education, researchers, and academicians.</description><identifier>ISBN: 1668486660</identifier><identifier>ISBN: 9781668486665</identifier><identifier>DOI: 10.4018/978-1-6684-8666-5.ch013</identifier><language>eng</language><publisher>IGI Global</publisher><subject>Cyber and Network Security ; LCSH: Malware (Computer software) ; Prevention. | Intrusion ; Security & Forensics ; Systems & Software Design</subject><ispartof>Malware Analysis and Intrusion Detection in Cyber-Physical Systems, 2023, p.285-312</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Uhttps://coverimages.igi-global.com/cover-images/covers/9781668486665.png</thumbnail><link.rule.ids>779,780,784,793,23137,27924</link.rule.ids></links><search><creatorcontrib>Shiva Darshan</creatorcontrib><creatorcontrib>Manoj Kumar</creatorcontrib><creatorcontrib>Prashanth</creatorcontrib><creatorcontrib>Vishnu Srinivasa Murthy</creatorcontrib><title>Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks</title><title>Malware Analysis and Intrusion Detection in Cyber-Physical Systems</title><description>Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in Cyber-Physical Systems focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in real time. Covering topics such as intrusion detection systems, low-cost manufacturing, and surveillance robots, this premier reference source is essential for cyber security professionals, computer scientists, students and educators of higher education, researchers, and academicians.</description><subject>Cyber and Network Security</subject><subject>LCSH: Malware (Computer software)</subject><subject>Prevention. | Intrusion</subject><subject>Security & Forensics</subject><subject>Systems & Software Design</subject><isbn>1668486660</isbn><isbn>9781668486665</isbn><fulltext>true</fulltext><rsrctype>book_chapter</rsrctype><creationdate>2023</creationdate><recordtype>book_chapter</recordtype><sourceid/><recordid>eNplkMtOwzAURC0hJKD0G_APuNybxK7NLoooryIWwDpynOtiGsVVbKni72mBHauRzoxmcRi7QlhUgPraLLVAoZSuhFZKCblwH4DlCbvAIzwyOGPzlD4BoNAAWhbn7PHZDns7EV_FicYUXLrh9cjr3W4IzuYQRx49f3WBxhx8cPxpjPuB-g3xHHnz1dHE65yt26ZLdurtkGj-lzP2vrp9a-7F-uXuoanXIiBiFmSh8p0DKQ1Z6wCUosoaY8CXIL3uPJbGGy-hl-TJHNb9oaq6YgkoSZYzBr-_YRPaLsZtahHao4P2n4P2x0H5Db6bUM4</recordid><startdate>20230926</startdate><enddate>20230926</enddate><creator>Shiva Darshan</creator><creator>Manoj Kumar</creator><creator>Prashanth</creator><creator>Vishnu Srinivasa Murthy</creator><general>IGI Global</general><scope/></search><sort><creationdate>20230926</creationdate><title>Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks</title><author>Shiva Darshan ; Manoj Kumar ; Prashanth ; Vishnu Srinivasa Murthy</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i111t-ea04fbc0559eaac0066e4a9990f305f8bf139f9f50d5efe904fd0f34b27015e53</frbrgroupid><rsrctype>book_chapters</rsrctype><prefilter>book_chapters</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cyber and Network Security</topic><topic>LCSH: Malware (Computer software)</topic><topic>Prevention. | Intrusion</topic><topic>Security & Forensics</topic><topic>Systems & Software Design</topic><toplevel>online_resources</toplevel><creatorcontrib>Shiva Darshan</creatorcontrib><creatorcontrib>Manoj Kumar</creatorcontrib><creatorcontrib>Prashanth</creatorcontrib><creatorcontrib>Vishnu Srinivasa Murthy</creatorcontrib></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Shiva Darshan</au><au>Manoj Kumar</au><au>Prashanth</au><au>Vishnu Srinivasa Murthy</au><format>book</format><genre>bookitem</genre><ristype>CHAP</ristype><atitle>Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks</atitle><btitle>Malware Analysis and Intrusion Detection in Cyber-Physical Systems</btitle><date>2023-09-26</date><risdate>2023</risdate><spage>285</spage><epage>312</epage><pages>285-312</pages><isbn>1668486660</isbn><isbn>9781668486665</isbn><abstract>Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in Cyber-Physical Systems focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in real time. Covering topics such as intrusion detection systems, low-cost manufacturing, and surveillance robots, this premier reference source is essential for cyber security professionals, computer scientists, students and educators of higher education, researchers, and academicians.</abstract><pub>IGI Global</pub><doi>10.4018/978-1-6684-8666-5.ch013</doi><tpages>28</tpages></addata></record> |
fulltext | fulltext |
identifier | ISBN: 1668486660 |
ispartof | Malware Analysis and Intrusion Detection in Cyber-Physical Systems, 2023, p.285-312 |
issn | |
language | eng |
recordid | cdi_igi_books_10_4018_978-1-6684-8666-5_ch013 |
source | InfoSci-Books |
subjects | Cyber and Network Security LCSH: Malware (Computer software) Prevention. | Intrusion Security & Forensics Systems & Software Design |
title | Malware Forensics: An Application of Scientific Knowledge to Cyber Attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-11T22%3A19%3A05IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-igi&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=bookitem&rft.atitle=Malware%20Forensics:%20An%20Application%20of%20Scientific%20Knowledge%20to%20Cyber%20Attacks&rft.btitle=Malware%20Analysis%20and%20Intrusion%20Detection%20in%20Cyber-Physical%20Systems&rft.au=Shiva%20Darshan&rft.date=2023-09-26&rft.spage=285&rft.epage=312&rft.pages=285-312&rft.isbn=1668486660&rft.isbn_list=9781668486665&rft_id=info:doi/10.4018/978-1-6684-8666-5.ch013&rft_dat=%3Cigi%3E10.4018/978-1-6684-8666-5.ch013%3C/igi%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |