Hybrid Analysis Model for Detecting Fileless Malware

שמור ב:
מידע ביבליוגרפי
הוצא לאור ב:Electronics vol. 14, no. 15 (2025), p. 3134-3169
מחבר ראשי: Sherazi Syed Noman Ali
מחברים אחרים: Qureshi Amna
יצא לאור:
MDPI AG
נושאים:
גישה מקוונת:Citation/Abstract
Full Text + Graphics
Full Text - PDF
תגים: הוספת תג
אין תגיות, היה/י הראשונ/ה לתייג את הרשומה!

MARC

LEADER 00000nab a2200000uu 4500
001 3239023638
003 UK-CbPIL
022 |a 2079-9292 
024 7 |a 10.3390/electronics14153134  |2 doi 
035 |a 3239023638 
045 2 |b d20250101  |b d20251231 
084 |a 231458  |2 nlm 
100 1 |a Sherazi Syed Noman Ali 
245 1 |a Hybrid Analysis Model for Detecting Fileless Malware 
260 |b MDPI AG  |c 2025 
513 |a Journal Article 
520 3 |a Fileless malware is a type of malware that does not rely on executable files to persist or propagate. Unlike traditional file-based malware, fileless malware is more difficult to detect and remove, posing a significant threat to organizations. This paper introduces a novel hybrid analysis model that combines static and dynamic analysis techniques to identify fileless malware. Applied to four real-world and two custom-created fileless malware samples, the proposed model demonstrated its qualitative effectiveness in uncovering complex behaviors and evasion tactics, such as obfuscated macros, process injection, registry persistence, and covert network communications, which often bypass single-method analyses. While the analysis reveals the potential for significant damage to organizational reputation, resources, and operations, the paper also outlines a set of mitigation measures that cybersecurity professionals and researchers can adopt to protect users and organizations against threats posed by fileless malware. Overall, this research offers valuable insights and a novel analysis model to better address and understand fileless malware threats. 
653 |a Software 
653 |a Data integrity 
653 |a Malware 
653 |a Computer viruses 
653 |a Privacy 
653 |a Business operations 
653 |a Organizations 
653 |a Cybersecurity 
653 |a Ransomware 
700 1 |a Qureshi Amna 
773 0 |t Electronics  |g vol. 14, no. 15 (2025), p. 3134-3169 
786 0 |d ProQuest  |t Advanced Technologies & Aerospace Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3239023638/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text + Graphics  |u https://www.proquest.com/docview/3239023638/fulltextwithgraphics/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3239023638/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch