On malware characterization and attack classification

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Abstract

Malware is one of the significant problems in the current Internet. Often security tool vendors develop an attack signature to deal with the attacks. However attack techniques such as polymorphism and metamorphism can be used by the attacker to generate multiple variants of the malware and complicate the signature identification. In this paper we present our analysis on sample set of malware and then discuss how MAEC’s taxonomy can help to address the malware problem.
Original languageEnglish
Title of host publicationProceedings of the First Australasian Web Conference (AWC 2013)
EditorsHelen Ashman, Quan Z. Sheng, Andrew Trotman
Place of PublicationSydney
PublisherAustralian Computer Society
Pages43-48
Number of pages6
ISBN (Print)9781921770296
Publication statusPublished - 2013
EventAustralasian Web Conference (1st : 2013) - Adelaide, SA
Duration: 29 Jan 20131 Feb 2013

Publication series

NameConferences in Research and Practice in Information Technology (CRPIT)
PublisherAustralian Computer Society
Volume144
ISSN (Print)1445-1336

Conference

ConferenceAustralasian Web Conference (1st : 2013)
CityAdelaide, SA
Period29/01/131/02/13

Keywords

  • Malware
  • Software Security
  • MAEC framework

Fingerprint Dive into the research topics of 'On malware characterization and attack classification'. Together they form a unique fingerprint.

  • Cite this

    Lee, A., Varadharajan, V., & Tupakula, U. (2013). On malware characterization and attack classification. In H. Ashman, Q. Z. Sheng, & A. Trotman (Eds.), Proceedings of the First Australasian Web Conference (AWC 2013) (pp. 43-48). (Conferences in Research and Practice in Information Technology (CRPIT); Vol. 144). Sydney: Australian Computer Society.