Multistage Malware Detection Method for Backup Systems

Pavel Novák, V. Oujezský, Patrik Kaura, T. Horvath, M. Holik
{"title":"Multistage Malware Detection Method for Backup Systems","authors":"Pavel Novák, V. Oujezský, Patrik Kaura, T. Horvath, M. Holik","doi":"10.3390/technologies12020023","DOIUrl":null,"url":null,"abstract":"This paper proposes an innovative solution to address the challenge of detecting latent malware in backup systems. The proposed detection system utilizes a multifaceted approach that combines similarity analysis with machine learning algorithms to improve malware detection. The results demonstrate the potential of advanced similarity search techniques, powered by the Faiss model, in strengthening malware discovery within system backups and network traffic. Implementing these techniques will lead to more resilient cybersecurity practices, protecting essential systems from hidden malware threats. This paper’s findings underscore the potential of advanced similarity search techniques to enhance malware discovery in system backups and network traffic, and the implications of implementing these techniques include more resilient cybersecurity practices and protecting essential systems from malicious threats hidden within backup archives and network data. The integration of AI methods improves the system’s efficiency and speed, making the proposed system more practical for real-world cybersecurity. This paper’s contribution is a novel and comprehensive solution designed to detect latent malware in backups, preventing the backup of compromised systems. The system comprises multiple analytical components, including a system file change detector, an agent to monitor network traffic, and a firewall, all integrated into a central decision-making unit. The current progress of the research and future steps are discussed, highlighting the contributions of this project and potential enhancements to improve cybersecurity practices.","PeriodicalId":504839,"journal":{"name":"Technologies","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/technologies12020023","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper proposes an innovative solution to address the challenge of detecting latent malware in backup systems. The proposed detection system utilizes a multifaceted approach that combines similarity analysis with machine learning algorithms to improve malware detection. The results demonstrate the potential of advanced similarity search techniques, powered by the Faiss model, in strengthening malware discovery within system backups and network traffic. Implementing these techniques will lead to more resilient cybersecurity practices, protecting essential systems from hidden malware threats. This paper’s findings underscore the potential of advanced similarity search techniques to enhance malware discovery in system backups and network traffic, and the implications of implementing these techniques include more resilient cybersecurity practices and protecting essential systems from malicious threats hidden within backup archives and network data. The integration of AI methods improves the system’s efficiency and speed, making the proposed system more practical for real-world cybersecurity. This paper’s contribution is a novel and comprehensive solution designed to detect latent malware in backups, preventing the backup of compromised systems. The system comprises multiple analytical components, including a system file change detector, an agent to monitor network traffic, and a firewall, all integrated into a central decision-making unit. The current progress of the research and future steps are discussed, highlighting the contributions of this project and potential enhancements to improve cybersecurity practices.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
备份系统的多级恶意软件检测方法
本文提出了一种创新的解决方案,以应对在备份系统中检测潜伏恶意软件的挑战。所提出的检测系统采用了一种多方面的方法,将相似性分析与机器学习算法相结合,以提高恶意软件的检测能力。研究结果表明,由 Faiss 模型驱动的高级相似性搜索技术在加强系统备份和网络流量中恶意软件的发现方面具有潜力。采用这些技术将提高网络安全实践的弹性,保护重要系统免受隐藏恶意软件的威胁。本文的研究结果强调了高级相似性搜索技术在加强系统备份和网络流量中恶意软件发现方面的潜力,实施这些技术的意义包括提高网络安全实践的弹性,保护重要系统免受隐藏在备份档案和网络数据中的恶意软件威胁。人工智能方法的集成提高了系统的效率和速度,使所提出的系统在现实世界的网络安全中更加实用。本文的贡献在于提出了一个新颖而全面的解决方案,旨在检测备份中潜藏的恶意软件,防止备份被入侵的系统。该系统由多个分析组件组成,包括系统文件变化检测器、网络流量监控代理和防火墙,所有组件都集成到一个中央决策单元中。报告讨论了研究的当前进展和未来步骤,强调了本项目的贡献以及改进网络安全实践的潜在改进措施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Oxygen Measurement in Cuprate Superconductors Using the Dissolved Oxygen/Chlorine Method Development and Evaluation of an mHealth App That Promotes Access to 3D Printable Assistive Devices Probabilistic Confusion Matrix: A Novel Method for Machine Learning Algorithm Generalized Performance Analysis Improvement of the ANN-Based Prediction Technology for Extremely Small Biomedical Data Analysis Optimizing Speech Emotion Recognition with Machine Learning Based Advanced Audio Cue Analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1