Publication details

Multistage Malware Detection Method for Backup Systems

Authors

NOVÁK Pavel OUJEZSKÝ Václav KAURA Patrik HORVÁTH Tomáš HOLÍK Martin

Year of publication 2024
Type Article in Periodical
Magazine / Source TECHNOLOGIES
MU Faculty or unit

Faculty of Informatics

Citation
Web https://doi.org/10.3390/technologies12020023
Doi http://dx.doi.org/10.3390/technologies12020023
Keywords backup; detection; hashes; malware; model; machine learning; system
Description This paper proposes an innovative solution to address the challenge of detecting latent malware in backup systems. The proposed detection system utilizes a multifaceted approach that combines similarity analysis with machine learning algorithms to improve malware detection. The results demonstrate the potential of advanced similarity search techniques, powered by the Faiss model, in strengthening malware discovery within system backups and network traffic. Implementing these techniques will lead to more resilient cybersecurity practices, protecting essential systems from hidden malware threats. This paper’s findings underscore the potential of advanced similarity search techniques to enhance malware discovery in system backups and network traffic, and the implications of implementing these techniques include more resilient cybersecurity practices and protecting essential systems from malicious threats hidden within backup archives and network data. The integration of AI methods improves the system’s efficiency and speed, making the proposed system more practical for real-world cybersecurity. This paper’s contribution is a novel and comprehensive solution designed to detect latent malware in backups, preventing the backup of compromised systems. The system comprises multiple analytical components, including a system file change detector, an agent to monitor network traffic, and a firewall, all integrated into a central decision-making unit. The current progress of the research and future steps are discussed, highlighting the contributions of this project and potential enhancements to improve cybersecurity practices.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.

More info