Cybercrime : the case of obfuscated malware

Alazab, Mamoun, Venkatraman, Sitalakshmi, Watters, Paul, Alazab, Moutaz and Alazab, Ammar 2011, Cybercrime : the case of obfuscated malware, in 7th ICGS3 / 4th e-Democracy Joint Conferences 2011 : Proceedings of the International Conference in Global Security, Safety and Sustainability / International Conference on e-Democracy, [Springer], [unknown], pp. 1-8.

Attached Files
Name Description MIMEType Size Downloads

Title Cybercrime : the case of obfuscated malware
Author(s) Alazab, Mamoun
Venkatraman, Sitalakshmi
Watters, Paul
Alazab, Moutaz
Alazab, Ammar
Conference name International Conference in Global Security, Safety and Sustainability / International Conference on e-Democracy (2011 : Thessaloniki, Greece)
Conference location Thessaloniki, Greece
Conference dates 24-26 Aug. 2011
Title of proceedings 7th ICGS3 / 4th e-Democracy Joint Conferences 2011 : Proceedings of the International Conference in Global Security, Safety and Sustainability / International Conference on e-Democracy
Editor(s) [unknown]
Publication date 2011
Conference series International Conference in Global Security, Safety and Sustainability / International Conference on e-Democracy
Start page 1
End page 8
Total pages 8
Publisher [Springer]
Place of publication [unknown]
Keyword(s) cybercrime
obfuscation
malware
intrusion detection
Summary Cybercrime has rapidly developed in recent years and malware is one of the major security threats in computer which have been in existence from the very early days. There is a lack of understanding of such malware threats and what mechanisms can be used in implementing security prevention as well as to detect the threat. The main contribution of this paper is a step towards addressing this by investigating the different techniques adopted by obfuscated malware as they are growingly widespread and increasingly sophisticated with zero-day exploits. In particular, by adopting certain effective detection methods our investigations show how cybercriminals make use of file system vulnerabilities to inject hidden malware into the system. The paper also describes the recent trends of Zeus botnets and the importance of anomaly detection to be employed in addressing the new Zeus generation of malware.
Language eng
Field of Research 080303 Computer System Security
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
HERDC collection year 2011
Persistent URL http://hdl.handle.net/10536/DRO/DU:30045577

Document type: Conference Paper
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Access Statistics: 107 Abstract Views, 22 File Downloads  -  Detailed Statistics
Created: Fri, 25 May 2012, 14:13:26 EST by Barb Robertson

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.