A survey on the evolution of fileless attacks and detection techniques

Side Liu,Guojun Peng, Haitao Zeng,Jianming Fu

COMPUTERS & SECURITY(2024)

引用 0|浏览1
暂无评分
摘要
Fileless attacks have gained significant prominence and have become the prevailing type of attack in recent years. The exceptional level of stealthiness and difficulty in detection inherent in fileless attacks has made them highly favored by attackers. In this paper, we have conducted a comprehensive review of the historical development of fileless attack techniques, systematically analyzed various technical aspects and characteristics of fileless attacks, and proposed a comprehensive fileless threat model. Additionally, we have introduced a novel perspective for classifying fileless attack techniques based on their leverage in the system hierarchy. Furthermore, we conduct a systematic review of research on various fileless attack detection techniques, summarize the challenges in fileless attack detection, and discuss future directions for research in fileless attack detection.
更多
查看译文
关键词
Fileless attack,Attack detection,Living-off-the-land,APT,Provenance graph
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要