A Functional Model and Analysis of Next Generation Malware Attacks and Defenses

Calton Pu, Qingyang Wang, Yasuhiko Kanemasa, Rodrigo Alves Lima, Joshua Kimball, Shungeng Zhang, Jianshu Liu, Xuhang Gu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Recent ransomware attacks (e.g., Colonial and JBS) caused significant social and economic impact due to their ability to shut down entire businesses. A functional model divides next-generation malware (NG-malware) attacks into 3 stages: Penetration (to gain a foothold), Propagation (to gain full control of target system), and a variety of Exploitation methods. The functional model shows that many attack methods and tools can be flexibly combined to bypass implementation-specific defenses at each stage, with the most important defense battleground being the prevention of NG-malware gaining full control of target system. Given the potential for further evolution of MG-malware, e.g., obfuscation of lateral movement jobs to increase both the speed and stealth of Propagation, it is crucial for the defense to develop effective defenses to detect NG-malware Propagation before ceding full control. An experimental platform that enables detailed evaluation of new NG-malware attacks and defenses is an effective tool in the battle for full control.

Original languageEnglish (US)
Title of host publicationProceedings - 2021 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages197-206
Number of pages10
ISBN (Electronic)9781665416238
DOIs
StatePublished - 2021
Event3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2021 - Virtual, Online, United States
Duration: Dec 13 2021Dec 15 2021

Publication series

NameProceedings - 2021 3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2021

Conference

Conference3rd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, TPS-ISA 2021
Country/TerritoryUnited States
CityVirtual, Online
Period12/13/2112/15/21

Keywords

  • insider attack
  • malware
  • millibottleneck
  • obfuscation
  • ransomware

ASJC Scopus subject areas

  • Artificial Intelligence
  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A Functional Model and Analysis of Next Generation Malware Attacks and Defenses'. Together they form a unique fingerprint.

Cite this