Informace o publikaci

Multistage Malware Detection Method for Backup Systems

Autoři

NOVÁK Pavel OUJEZSKÝ Václav KAURA Patrik HORVÁTH Tomáš HOLÍK Martin

Rok publikování 2024
Druh Článek v odborném periodiku
Časopis / Zdroj TECHNOLOGIES
Fakulta / Pracoviště MU

Fakulta informatiky

Citace
www https://doi.org/10.3390/technologies12020023
Doi http://dx.doi.org/10.3390/technologies12020023
Klíčová slova backup; detection; hashes; malware; model; machine learning; system
Popis This paper proposes an innovative solution to address the challenge of detecting latent malware in backup systems. The proposed detection system utilizes a multifaceted approach that combines similarity analysis with machine learning algorithms to improve malware detection. The results demonstrate the potential of advanced similarity search techniques, powered by the Faiss model, in strengthening malware discovery within system backups and network traffic. Implementing these techniques will lead to more resilient cybersecurity practices, protecting essential systems from hidden malware threats. This paper’s findings underscore the potential of advanced similarity search techniques to enhance malware discovery in system backups and network traffic, and the implications of implementing these techniques include more resilient cybersecurity practices and protecting essential systems from malicious threats hidden within backup archives and network data. The integration of AI methods improves the system’s efficiency and speed, making the proposed system more practical for real-world cybersecurity. This paper’s contribution is a novel and comprehensive solution designed to detect latent malware in backups, preventing the backup of compromised systems. The system comprises multiple analytical components, including a system file change detector, an agent to monitor network traffic, and a firewall, all integrated into a central decision-making unit. The current progress of the research and future steps are discussed, highlighting the contributions of this project and potential enhancements to improve cybersecurity practices.
Související projekty:

Používáte starou verzi internetového prohlížeče. Doporučujeme aktualizovat Váš prohlížeč na nejnovější verzi.

Další info