Abstract
In this chapter, we address the introduction to cybersecurity and problems associated with cybersecurity in particular malicious activities in cyber space. The proliferation and exponential increase of malware has continued to present a serious threat to the security of information systems. Furthermore, with the development of evermore sophisticated methods of evading detection, malware has posed serious challenges to combat it. Moreover, due to the continuous changes in malware design, antimalware (AM) strategy that has been successful in a given time period will not work at a much later date. In this chapter, we propose the challenges of malware in cyberspace and its detection approach called cumulative timeline analysis (CTA) that retains high accuracy over an extended time period. The effectiveness of the proposed approach is tested on malware executables collected over a span of 10 years with almost constant accuracy.
Original language | English |
---|---|
Title of host publication | Information security |
Subtitle of host publication | Foundations, technologies and applications |
Editors | Ali Ismail Awad, Michael Fairhurst |
Place of Publication | United Kingdom |
Publisher | Institution of Engineering and Technology (IET) |
Chapter | 10 |
Pages | 215-239 |
Number of pages | 25 |
Edition | 1st |
ISBN (Electronic) | 9781849199766 |
ISBN (Print) | 9781849199742 |
DOIs | |
Publication status | Published - Apr 2018 |