Possible Scenario for Malware Exploit Investigation with Data-Driven Architecture

doi: 10.32567/hm.2022.4.10

Absztrakt

In this article, the authors present a data-driven architecture-based malware exploit analysis as the next part of the Penetration Testing article series. The analysis contributes greatly to investigating malicious attacks, which are becoming increasingly sophisticated in cyberspace, thus posing a significant threat to the information and communication networks of state and non-state actors. To achieve their research objectives, the authors use analytical evaluation methods to define the principles, modular elements and procedures of the data-driven architecture to be applied, where decisions are made based on the available data. On this basis, they have presented an analytical process that can help the public and defence sectors to analyse this type of attack, thus facilitating recovery processes. 

Kulcsszavak:

Metasploit Metasploit keretrendszer vsFTPd NMAP TCP FTP

Hogyan kell idézni

Paráda, I., & Tóth, A. (2023). Possible Scenario for Malware Exploit Investigation with Data-Driven Architecture. Hadmérnök, 17(4), 153–174. https://doi.org/10.32567/hm.2022.4.10

Hivatkozások

Azarmi, Bahaaldine (2017): Learning Kibana 5.0. Birmingham: Packt Publishing.

Bejtlich, Richard (2010): The Tao of Network Security Monitoring. Beyond Intrusion Detection. Boston: Addison-Wesley Professional.

CompTIA: What Is Wireshark and How Is It Used? CompTIA, 10 November 2020. Online: https://www.comptia.org/content/articles/what-is-wireshark-and-how-to-use-it

Fang, Yufei – Shan, Zhiguang – Wang, Wei (2021): Modeling and Key Technologies of a Data-Driven Smart City System. IEEE Access, 9, 91244–91258. Online: https://doi.org/10.1109/ACCESS.2021.3091716

GoLinuxCloud: ELK Stack: Configure elasticsearch cluster setup CentOS/RHEL 7/8. 2020. Online: https://www.golinuxcloud.com/setup-configure-elasticsearch-cluster-7-linux/

Horváth, Ingrid: Understanding Common Vulnerabilities and Exposures. Invensis, 17 September 2020. Online: https://www.invensislearning.com/blog/understanding-common-vulnerabilities-and-exposures/

JFrog: What is a Software Vulnerability? JFrog, 22 August 2021. Online: https://jfrog.com/knowledge-base/software-vulnerability/

Jia, Kunqi – Wang, Zhihua – Fan, Shuai – Xiao, Jucheng – He, Guangyu (2018): Data-Driven Architecture Design and Application of Power Grid Cyber Physical System. Power System Technology, 42(10), 3116–3127. Online: https://doi.org/10.13335/j.1000-3673.pst.2018.0876

O’Driscoll, Aimee: What is an exploit kit (with examples) and how do cybercriminals use them? Comparitech, 07 May 2019. Online: https://www.comparitech.com/blog/information-security/exploit-kits/

Qin, Feng – Liu, Dongxia – Sun, Bingda – Ruan, Liu – Ma, Zhanhong – Wang, Haiguang (2016): Identification of Alfalfa Leaf Diseases Using Image Recognition Technology. Public Library of Science, 11(12), 1–7. Online: https://doi.org/10.1371/journal.pone.0168274

Tutorialspoint: What is an Exploit Kit? (Stages, Process, How to Stay Safe). Tutorialspoint, 14 June 2022. Online: https://www.tutorialspoint.com/what-is-an-exploit-kit-stagesprocess-how-to-stay-safe

Wang, Ying – Li, Peilong – Jiao, Lei – Su, Zhou – Cheng, Nan – Shen, Xuemin Sh. – Zhang, Ping (2017): A Data-Driven Architecture for Personalized QoE Management in 5G Wireless Networks. IEEE Wireless Communications, 24(1), 102–110. Online: https://doi.org/10.1109/MWC.2016.1500184WC

Wang, Zhihua – Xiao, Jucheng – Jia, Kunqi – Gao, Feng – Tang, Yuanhe – He, Guangyu (2018): A Data-Driven Architecture Design of Stream Computing for the Dispatch and Control System of the Power Grid. 2nd IEEE Conference on Energy Internet and Energy System Integration (EI2), 1–6. Online: https://doi.org/10.1109/EI2.2018.8582404