MIT Logo

An emerging threat Fileless malware: a survey and research challenges

Abstract:

Cyberattacks that are file based have improved in their efficacy as the relevant defense mechanisms have. One of these new prominent attack vectors is the use of fileless malware. Fileless malware operates by infiltrating the computer system without using the file system, which makes it much harder to detect and therefore counteract. The only leading ways to identify these attackers is through forensic security analysis, but these same attackers sometimes utilize anti forensics tools. This paper demonstrates the areas needed for improvement in order to combat the current threat landscape in cybersecurity.

Author:
Sudhakar & Sushil Kumar
Year:
2020
Domain: ,
Dimension: ,
Region:
Data Type: ,
MIT Political Science
MIT Political Science
ECIR
GSS