Publication | Closed Access
Ontology for malware behavior: A core model proposal
27
Citations
5
References
2014
Year
Unknown Venue
Ontology (Information Science)Malware FamilyEngineeringInformation SecuritySoftware EngineeringInformation ForensicsSemantic WebSoftware AnalysisHardware SecurityNovel Malware OntologyMalware DetectionMalware BehaviorThreat (Computer)Threat DetectionComputer ScienceSoftware DesignAnti-virus TechniqueFoundational OntologyCyber Threat IntelligenceMalware Analysis
The ubiquity of Internet-connected devices motivates attackers to create malicious programs (malware) to exploit users and their systems. Malware detection requires a deep understanding of their possible behaviors, one that is detailed enough to tell apart suspicious programs from benign, legitimate ones. A step to effectively address the malware problem leans toward the development of an ontology. Current efforts are based on an obsolete hierarchy of malware classes that defines a malware family by one single prevalent behavior (e.g., viruses infect other files, worms spread and exploit remote systems autonomously, Trojan horses disguise themselves as benign programs, and so on). In order to address the detection of modern, complex malware families whose infections involve sets of multiple exploit methods, we need an ontology broader enough to deal with these suspicious activities performed on the victim's system. In this paper, we propose a core model for a novel malware ontology that is based on their exhibited behavior, filling a gap in the field.
| Year | Citations | |
|---|---|---|
Page 1
Page 1