The exponential growth of the Internet interconnections has
led to some significant expansion of cyber-attack incidents often with
disastrous and grievous consequences. Malware is the primary choice of weapon
to perform malicious intents in the cyberspace, either by exploitation into
present vulnerabilities or use of special features of emerging technologies.
The development of more innovative and efficient malware defense mechanisms has
been regarded as a pressing requirement in the cybersecurity community. This
can be followed by critiques of existing innovative reduction techniques as to why
they do or do not do the job. We then share new attack patterns in emerging
technologies like sociable websites, cloud computing, smartphone technologies,
and critical infrastructure. Finally, we clarify our speculative observations
on potential research directions.
INTRODUCTION:
Our society, economy, and critical infrastructures are very Largely
dependent on computer networks and information technology options.
Cybersecurity becomes more appealing and potentially more disastrous as our
dependence on information technology increases. According to the Symantec
cybercrime report printed in April 2012, cyber-attacks cost US$114 billion each
year. In the event the time dropped by companies hoping to recover from
cyber-attacks is counted, the total cost of cyber-attacks would attain a staggering US$385 billion. Victims of cyber-attacks are also significantly
growing. Based on the survey conducted by Symantec that entailed interviewing
20,000 individuals across 24 countries, 69% reported being the victim of a
cyber-attack within their lifetime. Symantec calculated that 14 adults become
the casualty of a cyber-attack every second, or more than one million strikes
every day.
Why cyber Security flourish? It is because cyber-attacks are
more economical, convenient and less insecure than physical attacks. Cybercriminals only require a few expenses beyond a computer and an Internet
connection. They are unconstrained by geography and distance. They're difficult
to identity and prosecute due to the anonymous nature of the Internet. Given that
attacks against information technology systems are extremely appealing, it's
anticipated that the amount and sophistication of cyber-attacks will continue
growing.
Cybersecurity concerns with the understanding of
encompassing issues of diverse cyber-attacks and inventing defense strategies
(i.e., countermeasures) that maintain confidentiality, integrity and availability
of any digital and information technology.
Integrity is the term used to prevent some
modification/deletion in an unauthorized manner.
Availability is the term used to assure that the systems
responsible for delivering, storing and processing information are accessible
when needed and by people who want them.
Many cybersecurity specialists Consider that malware is the
secret selection of weapon to carry out malicious intends to breach
cybersecurity efforts in cyberspace. Malware refers to a wide class of
attacks that is packed on a system, normally without the understanding of the
legitimate owner, to undermine the machine to the benefit of an adversary.
Malware infects systems in many different manners for example propagation from
infected machines, tricking user to start tainted files, or users that are
alluring to visit malware propagating websites. In more concrete cases of
malware infection, malware may load itself on a USB drive inserted into an
infected apparatus and then infect every other system into that device is
subsequently inserted. Malware may propagate from devices and equipment's that
contain embedded systems and computational logic. Victims of malware can vary
anything from end-user systems, servers, network devices (i.e., routers, switches,
etc.) and process control systems like Supervisory Control and Data Acquisition
(SCADA). The proliferation and sophistication of rapid growing amount of
malware is a significant concern in the online today.
Traditionally, Malware attacks happened at a single point of
surface among hardware gear's, applications pieces or at network level
exploiting existing design and implementation vulnerabilities at every layer.
As opposed to protecting each asset, the perimeter defense strategy was used
predominantly to set a wall out all inner resources to protect everything
indoors from any unwanted intrusion from outside. Nearly all perimeter defense
mechanisms utilizes firewall and anti-virus software installed within intrusion
prevention/detection systems. Any traffic coming from outside is intercepted and
examined to make sure there is no malware penetrating into the interior
resources. The general acceptance of the perimeter defense version has happened as
it is far simpler and apparently less expensive to secure 1 perimeter than it
is to secure tens of thousands of applications or a large number of internal
components. To give more defined access to specific internal resources, the
access control mechanisms are used in conjunction with the perimeter defense
mechanism. On top of perimeter protection and access management, liability is
added to identify or punish for any misbehaviors, as reflected. On the other
hand, the joint efforts of perimeter defense plan have been proven to be
increasingly ineffective as the advancement and sophistication of malware
improves. Ever evolving malware constantly appears to find loopholes to skip the
perimeter defense altogether. We describe in detail the most common
exploitations in the 3 distinct layers of present information system at
hardware, software and network layers. We then discuss the advantages and
disadvantages of their most representative defense mechanisms which have been
utilized in these layers.
Malware evolves through time capitalizing on New approaches
and harnessing the flaws from the emerging technology to prevent detection. We
describe a range of new designs of malware attacks existing from emerging
technologies. In picking emerging technologies for illustration, we focus a few
which have changed how we live our everyday life. These include social media,
cloud computing, smartphone technology, and critical infrastructure. We discuss
unique characteristics of each of these emerging technologies and malware
utilizes the special characteristics to interrogate itself. By way of instance,
social networking, such as social networking sites and blogs, are now an
integral part of our life style due to the fact that a lot of people are
journaling about their lifestyle events, sharing information, in addition to
making friends. Realizing its potential to connect millions individuals at one
go, adversaries use social networking accounts to befriend unsuspecting
customers to use as vehicles for sending spam to the victim's buddies while the
victim's device is repurposed into a part of botnet.
Usage of computer resources like utilities where the
consumers pay only for the usage without having to set up any upfront expense
or requiring any abilities in handling complex computing infrastructure. The
growing trove of information focused in the cloud storage solutions is
currently attracting attackers. Together with the exposed growth by two billion
smartphone users by 2015, a significant expansion in mobile malware has been
witnessed in recent times. By way of instance, the number of special detections
of malware for Android improved internationally by 17 times in 2012 from the
previous year. There is also growing concerns in cyber threats to critical
infrastructure like electricity grids and healthcare systems to use in
terrorism, sabotage and information warfare. Aside from investigating
exploitations through unique attributes from the selected emerging
technologies, we also discuss general malware attack patterns appear in them to
comprehend the methods and trends of the new strikes.
Finally, we provide Our speculative observations as to where future research directions are heading. These include:
(1) privacy issues to protect increasing volumes of personal information entered in the worldwide web,
(2) The necessity to have a new generation of secure Internet from scratch with attentive thought of their subjected growth and usage patterns that were not true with the net we use today,
(3) Trusted system whose basic architecture differs from their beginning to withstand from ever-evolving malware,
(4) being able to identify and trace the source of attacks assisted by the evolution of international scale identity management system and traceback processes, and
(5) a strong emphasis on usable security to provide individuals security
controls they can understand and control.
The Rest of the article Section Gives an insight of this
malware. The section provides an overview And efforts to mitigate any current
vulnerabilities exploited by adversaries. Section reviews emerging approaches
to malware infiltration and discuss the overall attack Patterns and methods. The section discusses future research Instructions we identified; this will probably
be accompanied by concluding comments in Section.
No comments: