Exploring Common Malware Persistence Techniques on Windows Operating Systems (OS) for Enhanced Cybersecurity Management: Detection and Mitigation Strategies

In this chapter, we examine ten commonly used malware persistence methods on Windows operating systems. Our goal is to explain the principles behind these techniques, which enable malicious programs to remain active on a system. We provide examples of typical malware associated with each technique, along with useful tools for identifying them. Additionally, we offer mitigation strategies and recommendations that users and malware analysts can use to remove or prevent malware persistence methods. © 2024 selection and editorial matter, Ahmed A. Abd El-Latif, Yassine Maleh, Mohammed A. El-Affendi and Sadique Ahmad; individual chapters, the contributors.

Авторы
Le D.T. , Dinh T.D. , Nguyen P.H.T. , Muthanna A. , Abd El-Latif A.A.
Издательство
CRC Press
Язык
Английский
Страницы
107-149
Статус
Опубликовано
Год
2023
Организации
  • 1 NetSec-ITDUT Lab, University of Science and Technology, University of Danang, Danang, 550000, Viet Nam
  • 2 Faculty of Information Security, Posts and Telecommunications Institute of Technology, Hanoi, Viet Nam
  • 3 University of Information Technology, Vietnam National University, Ho Chi Minh City, Viet Nam
  • 4 Department of Applied Probability and Informatics, Peoples’ Friendship University of Russia (RUDN University), Moscow, 117198, Russian Federation
  • 5 EIAS Data Science Lab, College of Computer and Information Sciences, Prince Sultan University, Riyadh, 11586, Saudi Arabia
  • 6 Department of Mathematics and Computer Science, Faculty of Science, Menoufia University, 32511, Egypt
Цитировать
Поделиться

Другие записи