Developing a Κ-ary malware using blockchain
Cyberattacks are nowadays moving rapidly. They are customized, multi-vector, staged in multiple flows and targeted. Moreover, new hacking playgrounds appeared to reach mobile network, modern architectures and smart cities. For that purpose, malware use different entry points and plug-ins. In additio...
Saved in:
| Published in | NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium pp. 1 - 4 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.04.2018
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2374-9709 |
| DOI | 10.1109/NOMS.2018.8406331 |
Cover
| Summary: | Cyberattacks are nowadays moving rapidly. They are customized, multi-vector, staged in multiple flows and targeted. Moreover, new hacking playgrounds appeared to reach mobile network, modern architectures and smart cities. For that purpose, malware use different entry points and plug-ins. In addition, they are now deploying several techniques for obfuscation, camouflage and analysis resistance. On the other hand, antiviral protections are positioning innovative approaches exposing malicious indicators and anomalies, revealing assumptions of the limitations of the anti-antiviral mechanisms. Primarily, this paper exposes a state of art in computer virology and then introduces a new concept to create undetectable malware based on the blockchain technology. It summarizes techniques adopted by malicious software to avoid functionalities implemented for viral detection and presents the implementation of new viral techniques that leverage the blockchain network. |
|---|---|
| ISSN: | 2374-9709 |
| DOI: | 10.1109/NOMS.2018.8406331 |