Malware Cryptovirology Attacks in the Framework

Authors(1) :-Soumen Chakraborty

In this paper, its intend to study the concept of camouflage in malware and its evolution from non-stealth days to modern metamorphism. Moreover, we explore obfuscation techniques exploited via metamorphism, the most latest technique in malware camouflage. Also examine threats and assaults that misuse of cryptography can motive when mixed with fraudulent software program (viruses, Trojans). Public-key cryptography could be very essential for the attacks that based totally on cryptovirology. This paper additionally suggest a few of the countermeasures, mechanisms to cope with and prevent such assaults. Even if the attackers actions at the host machine are being monitored, it nevertheless can not be validated past reasonable doubt that he or she is the attacker; and it's far an “originator-concealing attack”. Evidence ought to be accumulated from the “writer’s very own system which changed into used for the assault”. These attacks have implications on how the use of cryptographic equipment and techniques should be audited and controlled in standard motive computing environments, and imply that get admission to to the cryptographic equipment need to be in properly manage of the system(such as API exercises).

Authors and Affiliations

Soumen Chakraborty
Department of Information Technology, MCKV Institute of Engineering, MAKAUT, West Bengal, India

Malware, Attacks, Malware Detection, Classification

  1. Adam Young and Moti Yung, Cryptovirilogy: Extortion Based Security Threat And Countermeasures, Proceedings of the 1996 IEEE Symposium on Security and Privacy.
  2. Com: http://www.cyptovirology. com
  3. Ivan Balepin Department of Computer Science University of California, Davis ‘Superworms and Cryptovirology: a Deadly Combination’
  4. Websense Security Labs, Malicious Website / Malicious Code: Cyber Extortion Attack, May 23, 2005: http://www.websense.wom/securitylab s/alerts/alert.Hypertext reprocessor?AlertID=194
  5. News with the aid of Ryan Naraine : Cryzip Trojan Encrypts Files, Demands Ransom March 13, 2006. Http://www.Eweek.Com/article2 /0,1759,1937408,00.Asp?Kc=EWRSS03119TX1K000594
  6. Vesselin Bontchev 4th Int. Virus Bull. Conf., 1994, pp. 65-eighty two. 1994 :‘Future Trends in Virus Writing’
  7. http://www.Viruslist.Com/en/viruses/encyclopedia?Virusid=313444
  8. John Morar, David Chess Virus bulletin convention, septemper 2000, pp.127-138 September 2000 ‘Can cryptography prevent laptop viruses?’
  9. Adleman. An summary principle of computer viruses. In Advances in Cryptology CRYPTO’88, volume 403. Lecture Notes in Computer Science, 1988.
  10. Blum. A system-impartial theory of the complexity of recursive capabilities. Journal of the Association for Computing Machinery, 14(2):322–336, 1967.
  11. Bonfante, M. Kaczmarek, and J.-Y. Marion. Toward an abstract pc virology. In ICTAC, pages 579–593, 2005.
  12. Bonfante, M. Kaczmarek, and J.-Y. Marion. On summary laptop virology from a recursion-theoretic perspective. Journal in Computer Virology, 1(three-four), 2006.
  13. Case. Periodicity in generations of automata. Theory of Computing Systems, eight(1):15–32, 1974.
  14. Chess and S. White. An undetectable computer virus. Proceedings of the 2000 Virus Bulletin Conference (VB2000), 2000.
  15. Cohen. Computer Viruses. PhD thesis, University of Southern California, January 1986.
  16. F. Cohen. On the results of computer viruses and techniques of protection. Computers and Security, 7:167–184, 1988.

Publication Details

Published in : Volume 2 | Issue 1 | January-February 2017
Date of Publication : 2017-02-28
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 156-163
Manuscript Number : CSEIT172134
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Soumen Chakraborty, "Malware Cryptovirology Attacks in the Framework", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 1, pp.156-163 , January-February.2017
URL : http://ijsrcseit.com/CSEIT172134

Follow Us

Contact Us