Cybersecurity: Timeline malware analysis and classification

Research output: Book chapter/Published conference paperChapter (peer-reviewed)

Abstract

In this chapter, we address the introduction to cybersecurity and problems associated with cybersecurity in particular malicious activities in cyber space. The proliferation and exponential increase of malware has continued to present a serious threat to the security of information systems. Furthermore, with the development of evermore sophisticated methods of evading detection, malware has posed serious challenges to combat it. Moreover, due to the continuous changes in malware design, antimalware (AM) strategy that has been successful in a given time period will not work at a much later date. In this chapter, we propose the challenges of malware in cyberspace and its detection approach called cumulative timeline analysis (CTA) that retains high accuracy over an extended time period. The effectiveness of the proposed approach is tested on malware executables collected over a span of 10 years with almost constant accuracy.
Original languageEnglish
Title of host publicationInformation security
Subtitle of host publicationFoundations, technologies and applications
EditorsAli Ismail Awad, Michael Fairhurst
Place of PublicationUnited Kingdom
PublisherInstitution of Engineering and Technology (IET)
Chapter10
Pages215-239
Number of pages25
Edition1st
ISBN (Electronic)9781849199766
ISBN (Print)9781849199742
DOIs
Publication statusPublished - Apr 2018

Fingerprint Dive into the research topics of 'Cybersecurity: Timeline malware analysis and classification'. Together they form a unique fingerprint.

  • Cite this

    Islam, MD. R. (2018). Cybersecurity: Timeline malware analysis and classification. In A. I. Awad, & M. Fairhurst (Eds.), Information security: Foundations, technologies and applications (1st ed., pp. 215-239). Institution of Engineering and Technology (IET). https://doi.org/10.1049/PBSE001E_ch10