REAL

Possible Scenario for Malware Exploit Investigation with Data-Driven Architecture

Paráda, István and Tóth, András (2022) Possible Scenario for Malware Exploit Investigation with Data-Driven Architecture. HADMÉRNÖK, 17 (4). pp. 153-174. ISSN 1788-1919

[img]
Preview
Text
10_parada-toth_153-174_HM2022_4.pdf
Available under License Creative Commons Attribution Non-commercial No Derivatives.

Download (3MB) | Preview

Abstract

In this article, the authors present a data-driven architecture-based malware exploit analysis as the next part of the Penetration Testing article series. The analysis contributes greatly to investigating malicious attacks, which are becoming increasingly sophisticated in cyberspace, thus posing a significant threat to the information and communication networks of state and non-state actors. To achieve their research objectives, the authors use analytical evaluation methods to define the principles, modular elements and procedures of the data-driven architecture to be applied, where decisions are made based on the available data. On this basis, they have presented an analytical process that can help the public and defence sectors to analyse this type of attack, thus facilitating recovery processes.

Item Type: Article
Additional Information: The research was financed by the National Research Development and Innovation Office Fund and was implemented in the funding of the Thematic Program of Excellence 2020 application program number TKP2020-NKA-09.
Uncontrolled Keywords: Metasploit, Metasploit Framework, vsFTPd, NMAP, TCP, FTP
Subjects: T Technology / alkalmazott, műszaki tudományok > T2 Technology (General) / műszaki tudományok általában
U Military Science / hadtudomány > U1 Military Science (General) / hadtudomány általában
SWORD Depositor: MTMT SWORD
Depositing User: MTMT SWORD
Date Deposited: 28 Mar 2023 10:38
Last Modified: 28 Mar 2023 10:38
URI: http://real.mtak.hu/id/eprint/162955

Actions (login required)

Edit Item Edit Item