Guest Lecture 1 Flashcards
1
Q
Name different malware types and attack vectors
A
Spam: (testing, profilering)
Network: intrusion (spoofing)
Fraud: (forged documents )
Malicious text: (Fake news, trolling, revised messages)
Malware: (trojan, Botnet, spyware)
Authentication and Authorization attacks: (spying, keylogger credential harvesting, further attacks on same system )
Unauthorised attacks: (brute force hacker attacks)
Phishing: (automated system defence bypass)
2
Q
What is the main approach to Signature-based Detection? (Traditional Anti-virus sofware)
A
- Collect or Capture the new malware sample (Honeypot,
host-device etc.) - Analyze the sample (manual, automated, static, Dynamic,
mixed) - Create singature (sequence of strings,bytes, use of wildcards
char (*,#,) etc. Note: Yara tool, ClamAV - Distribute the signatures* (Central Server =⇒ clients)
- Signature update at client machine.
3
Q
What is the main approach to Non Signature-based Detection? (Behaviroal)
A
- Collect sample for each class (example: Malware & Benign)
- Pre-process the sample (removing the unwanted samples, changing format etc.)
- Feature extraction(Static, Dynamic and Hybrid), Engineering and Representation
- Training, Testing, and Tunning the Model
5 . Deployment of Model