Abstract
This paper proposes a hierarchical approach to analyzing information security in modern information systems that consists of multilevel collection, analysis, and control of events. We have analyzed the mechanisms and peculiarities of how malware acts at each level of the information system, determined the features of the mechanisms of action of malware, its masking, and possible methods for detecting malware.
Similar content being viewed by others
References
Kaspersky Security Bulletin 2015. https://securelist.com/files/2015/12/Kaspersky-Security-Bulletin-2015_ FINAL_EN.pdf.
Kasslin, K. and Lumpur, K., Kernel malware: The attack from within. http://nicolascormier.com/documentation/security/kasslin_kernel_malware_paper.pdf.
A Technical Breakdown of ModPOS. https://breakingmalware.com/malware/a-technical-breakdown-ofmodpos.
Zhang, X., van Doorn, L., Jaeger, T., Perez, R., and Sailer, R., Secure coprocessor-based intrusion detection, Proc. of the Tenth ACM SIGOPS European Workshop, 2002.
Petroni, N. and Fraser, T., Copilot–a coprocessor-based kernel runtime integrity monitor, Proc. of the 13th Conference on USENIX Security Symposium, 2004.
VMware vShield Endpoint. http://www.vmware.com/content/dam/digitalmarketing/vmware/ru/pdf/VMwarevShield-Endpoint-Datasheet.pdf.
Rutkowska, J., Subverting Vista Kernel for Fun and Profit. Presented at Black Hat USA, 2006. http://blackhat.com/presentations/bh-usa-06/BH-US-06-Rutkowska.pdf.
Embleton, S., Sparks, S., and Zou, C., SMM rootkits: A new breed of OS independent malware, Proc. of the 4th International Conference on Security and Privacy in Communication Networks, 2008.
Nohl, K., Kribler, S., and Lell, J., BadUSB–On accessories that turn evil, Presented at Black Hat USA, 2014. https://srlabs.de/wp-content/uploads/2014/07/SRLabs-BadUSB-BlackHat-v1.pdf.
King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., and Zhou, Y., Designing and implementation malicious hardware, Proc. of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats, 2008.
Becker, G.T., Regazzoni, F., Paar, C., and Burleson, W.P., International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, 2013, pp. 197–214.
Zammit, D., Intel x86s hide another CPU that can take over your machine. https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © E.Yu. Pavlenko, A.V. Yarmak, D.A. Moskvin, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
About this article
Cite this article
Pavlenko, E.Y., Yarmak, A.V. & Moskvin, D.A. Hierarchical approach to analyzing security breaches in information systems. Aut. Control Comp. Sci. 51, 829–834 (2017). https://doi.org/10.3103/S0146411617080144
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411617080144