• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

通过规范性恶意软件分析、检测和响应增强中小型组织的网络弹性。

Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response.

作者信息

Ilca Lucian Florin, Lucian Ogruţan Petre, Balan Titus Constantin

机构信息

Faculty of Electrical Engineering and Computer Science, "Transilvania" University of Brasov, 500036 Brasov, Romania.

出版信息

Sensors (Basel). 2023 Jul 28;23(15):6757. doi: 10.3390/s23156757.

DOI:10.3390/s23156757
PMID:37571540
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10422617/
Abstract

In this study, the methodology of cyber-resilience in small and medium-sized organizations (SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware analysis, detection and response using open-source solutions is proposed for detecting new emerging threats. By leveraging open-source solutions and software, a system specifically designed for SMEs with up to 250 employees is developed, focusing on the detection of new threats. Through extensive testing and validation, as well as efficient algorithms and techniques for anomaly detection, safety, and security, the effectiveness of the approach in enhancing SMEs' cyber-defense capabilities and bolstering their overall cyber-resilience is demonstrated. The findings highlight the practicality and scalability of utilizing open-source resources to address the unique cybersecurity challenges faced by SMEs. The proposed system combines advanced malware analysis techniques with real-time threat intelligence feeds to identify and analyze malicious activities within SME networks. By employing machine-learning algorithms and behavior-based analysis, the system can effectively detect and classify sophisticated malware strains, including those previously unseen. To evaluate the system's effectiveness, extensive testing and validation were conducted using real-world datasets and scenarios. The results demonstrate significant improvements in malware detection rates, with the system successfully identifying emerging threats that traditional security measures often miss. The proposed system represents a practical and scalable solution using containerized applications that can be readily deployed by SMEs seeking to enhance their cyber-defense capabilities.

摘要

在本研究中,对中小型组织(SMEs)的网络弹性方法进行了调查,并提出了一种利用开源解决方案进行规范性恶意软件分析、检测和响应的综合解决方案,用于检测新出现的威胁。通过利用开源解决方案和软件,开发了一个专门为员工人数多达250人的中小企业设计的系统,重点是检测新威胁。通过广泛的测试和验证,以及用于异常检测、安全和保障的高效算法和技术,证明了该方法在增强中小企业网络防御能力和提升其整体网络弹性方面的有效性。研究结果突出了利用开源资源应对中小企业所面临的独特网络安全挑战的实用性和可扩展性。所提出的系统将先进的恶意软件分析技术与实时威胁情报源相结合,以识别和分析中小企业网络内的恶意活动。通过采用机器学习算法和基于行为的分析,该系统可以有效地检测和分类复杂的恶意软件菌株,包括那些以前未见过的菌株。为了评估该系统的有效性,使用真实世界的数据集和场景进行了广泛的测试和验证。结果表明,恶意软件检测率有显著提高,该系统成功识别出传统安全措施经常遗漏的新出现威胁。所提出的系统代表了一种实用且可扩展的解决方案,使用容器化应用程序,可供寻求增强其网络防御能力的中小企业轻松部署。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/b0f0240b7be7/sensors-23-06757-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/588c14030504/sensors-23-06757-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/c34b819ab31a/sensors-23-06757-g0A2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/8bf3a9bb33a7/sensors-23-06757-g0A3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/a8a7fc603cb8/sensors-23-06757-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/5310cd00d68d/sensors-23-06757-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/b0f0240b7be7/sensors-23-06757-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/588c14030504/sensors-23-06757-g0A1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/c34b819ab31a/sensors-23-06757-g0A2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/8bf3a9bb33a7/sensors-23-06757-g0A3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/a8a7fc603cb8/sensors-23-06757-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/5310cd00d68d/sensors-23-06757-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/6cec/10422617/b0f0240b7be7/sensors-23-06757-g006.jpg

相似文献

1
Enhancing Cyber-Resilience for Small and Medium-Sized Organizations with Prescriptive Malware Analysis, Detection and Response.通过规范性恶意软件分析、检测和响应增强中小型组织的网络弹性。
Sensors (Basel). 2023 Jul 28;23(15):6757. doi: 10.3390/s23156757.
2
Deep-Hook: A trusted deep learning-based framework for unknown malware detection and classification in Linux cloud environments.深钩:一种基于深度学习的可信框架,用于在 Linux 云环境中检测和分类未知恶意软件。
Neural Netw. 2021 Dec;144:648-685. doi: 10.1016/j.neunet.2021.09.019. Epub 2021 Oct 2.
3
An Efficient DenseNet-Based Deep Learning Model for Malware Detection.一种基于高效密集连接网络的恶意软件检测深度学习模型。
Entropy (Basel). 2021 Mar 15;23(3):344. doi: 10.3390/e23030344.
4
Evaluation of Machine Learning Algorithms for Malware Detection.机器学习算法在恶意软件检测中的评估。
Sensors (Basel). 2023 Jan 13;23(2):946. doi: 10.3390/s23020946.
5
Sparse attention with residual pyramidal depthwise separable convolutional based malware detection with optimization mechanism.基于带有优化机制的残差金字塔深度可分离卷积的稀疏注意力恶意软件检测
Sci Rep. 2024 Oct 18;14(1):24414. doi: 10.1038/s41598-024-76193-4.
6
Zero-Day Malware Detection and Effective Malware Analysis Using Shapley Ensemble Boosting and Bagging Approach.零日恶意软件检测与 Shapley 集成提升和装袋方法在恶意软件分析中的有效应用。
Sensors (Basel). 2022 Apr 6;22(7):2798. doi: 10.3390/s22072798.
7
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning.基于网络威胁情报的集成学习恶意 URL 检测模型。
Sensors (Basel). 2022 Apr 28;22(9):3373. doi: 10.3390/s22093373.
8
E2E-RDS: Efficient End-to-End Ransomware Detection System Based on Static-Based ML and Vision-Based DL Approaches.E2E-RDS:基于静态 ML 和基于视觉的 DL 方法的高效端到端勒索软件检测系统。
Sensors (Basel). 2023 May 4;23(9):4467. doi: 10.3390/s23094467.
9
An Insight into the Machine-Learning-Based Fileless Malware Detection.基于机器学习的无文件恶意软件检测的深入分析。
Sensors (Basel). 2023 Jan 5;23(2):612. doi: 10.3390/s23020612.
10
A Malware Distribution Simulator for the Verification of Network Threat Prevention Tools.用于验证网络威胁预防工具的恶意软件传播模拟器
Sensors (Basel). 2021 Oct 21;21(21):6983. doi: 10.3390/s21216983.

引用本文的文献

1
Optimizing neural networks using spider monkey optimization algorithm for intrusion detection system.利用蜘蛛猴优化算法优化神经网络进行入侵检测系统。
Sci Rep. 2024 Jul 26;14(1):17196. doi: 10.1038/s41598-024-68342-6.
2
Security Risk Assessment for Patient Portals of Hospitals: A Case Study of Taiwan.医院患者门户网站的安全风险评估:以台湾地区为例
Risk Manag Healthc Policy. 2024 Jun 18;17:1647-1656. doi: 10.2147/RMHP.S463408. eCollection 2024.

本文引用的文献

1
Cybersecurity Enterprises Policies: A Comparative Study.网络安全企业政策:比较研究。
Sensors (Basel). 2022 Jan 11;22(2):538. doi: 10.3390/s22020538.
2
Development of NIST Atomic Databases and Online Tools.美国国家标准与技术研究院原子数据库及在线工具的开发。
Atoms. 2020;8(3). doi: 10.3390/atoms8030056.