2024
Multistage Malware Detection Method for Backup Systems
NOVÁK, Pavel; Václav OUJEZSKÝ; Patrik KAURA; Tomáš HORVÁTH; Martin HOLÍK et al.Základní údaje
Originální název
Multistage Malware Detection Method for Backup Systems
Autoři
Vydání
TECHNOLOGIES, SWITZERLAND, MDPI, 2024, 2227-7080
Další údaje
Jazyk
angličtina
Typ výsledku
Článek v odborném periodiku
Obor
20203 Telecommunications
Stát vydavatele
Švýcarsko
Utajení
není předmětem státního či obchodního tajemství
Odkazy
Impakt faktor
Impact factor: 3.600
Označené pro přenos do RIV
Ano
Kód RIV
RIV/00216224:14330/24:00139890
Organizační jednotka
Fakulta informatiky
UT WoS
EID Scopus
Klíčová slova anglicky
backup; detection; hashes; malware; model; machine learning; system
Příznaky
Mezinárodní význam, Recenzováno
Změněno: 4. 4. 2025 11:11, RNDr. Pavel Šmerk, Ph.D.
Anotace
V originále
This paper proposes an innovative solution to address the challenge of detecting latent malware in backup systems. The proposed detection system utilizes a multifaceted approach that combines similarity analysis with machine learning algorithms to improve malware detection. The results demonstrate the potential of advanced similarity search techniques, powered by the Faiss model, in strengthening malware discovery within system backups and network traffic. Implementing these techniques will lead to more resilient cybersecurity practices, protecting essential systems from hidden malware threats. This paper’s findings underscore the potential of advanced similarity search techniques to enhance malware discovery in system backups and network traffic, and the implications of implementing these techniques include more resilient cybersecurity practices and protecting essential systems from malicious threats hidden within backup archives and network data. The integration of AI methods improves the system’s efficiency and speed, making the proposed system more practical for real-world cybersecurity. This paper’s contribution is a novel and comprehensive solution designed to detect latent malware in backups, preventing the backup of compromised systems. The system comprises multiple analytical components, including a system file change detector, an agent to monitor network traffic, and a firewall, all integrated into a central decision-making unit. The current progress of the research and future steps are discussed, highlighting the contributions of this project and potential enhancements to improve cybersecurity practices.
Návaznosti
| VK01030030, projekt VaV |
|