Hybrid Analysis Model for Detecting Fileless Malware
שמור ב:
| הוצא לאור ב: | Electronics vol. 14, no. 15 (2025), p. 3134-3169 |
|---|---|
| מחבר ראשי: | |
| מחברים אחרים: | |
| יצא לאור: |
MDPI AG
|
| נושאים: | |
| גישה מקוונת: | Citation/Abstract Full Text + Graphics Full Text - PDF |
| תגים: |
אין תגיות, היה/י הראשונ/ה לתייג את הרשומה!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3239023638 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 2079-9292 | ||
| 024 | 7 | |a 10.3390/electronics14153134 |2 doi | |
| 035 | |a 3239023638 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 084 | |a 231458 |2 nlm | ||
| 100 | 1 | |a Sherazi Syed Noman Ali | |
| 245 | 1 | |a Hybrid Analysis Model for Detecting Fileless Malware | |
| 260 | |b MDPI AG |c 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a Fileless malware is a type of malware that does not rely on executable files to persist or propagate. Unlike traditional file-based malware, fileless malware is more difficult to detect and remove, posing a significant threat to organizations. This paper introduces a novel hybrid analysis model that combines static and dynamic analysis techniques to identify fileless malware. Applied to four real-world and two custom-created fileless malware samples, the proposed model demonstrated its qualitative effectiveness in uncovering complex behaviors and evasion tactics, such as obfuscated macros, process injection, registry persistence, and covert network communications, which often bypass single-method analyses. While the analysis reveals the potential for significant damage to organizational reputation, resources, and operations, the paper also outlines a set of mitigation measures that cybersecurity professionals and researchers can adopt to protect users and organizations against threats posed by fileless malware. Overall, this research offers valuable insights and a novel analysis model to better address and understand fileless malware threats. | |
| 653 | |a Software | ||
| 653 | |a Data integrity | ||
| 653 | |a Malware | ||
| 653 | |a Computer viruses | ||
| 653 | |a Privacy | ||
| 653 | |a Business operations | ||
| 653 | |a Organizations | ||
| 653 | |a Cybersecurity | ||
| 653 | |a Ransomware | ||
| 700 | 1 | |a Qureshi Amna | |
| 773 | 0 | |t Electronics |g vol. 14, no. 15 (2025), p. 3134-3169 | |
| 786 | 0 | |d ProQuest |t Advanced Technologies & Aerospace Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3239023638/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text + Graphics |u https://www.proquest.com/docview/3239023638/fulltextwithgraphics/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3239023638/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |