Skip to main content
Log in

Next-generation antivirus endowed with web-server Sandbox applied to audit fileless attack

  • Application of soft computing
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Almost all malwares running on web-server are php codes. Then, the present paper creates a next generation antivirus (NGAV) expert in auditing threats web-based, specifically from php files, in real time. In our methodology, the malicious behaviors, of the personal computer, serve as input attributes of the statistical learning machines. In all, our dynamic feature extraction monitors 11,777 behaviors that the web fileless attack can do when launched directly from a malicious web-server to a listening service in a personal computer. Our NGAV achieves an average 99.95% accuracy in the distinction between benign and malware web scripts. Distinct initial conditions and kernels of neural networks classifiers are investigated in order to maximize the accuracy of our NGAV. Our NGAV can supply the limitations of the commercial antiviruses as for the detection of Web fileless attack. In opposition of analysis of individual events, our engine employs authorial Web-server Sandbox, machine learning, and artificial intelligence in order to identify malicious Web-sites.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Data availability

To make our work easier to understand, the machine learning repository is freely available in matlab and csv formats. Also, we make available all benign and malware samples.

Notes

  1. malware (Malicious + Software)

  2. Example of deep neural network architecture. Available at: https://se.mathworks.com/help/deeplearning/gs/create-simple-image-classification-network-using-deep-network-designer.html Accessed on June. 2021.

  3. VirusShare is a repository of malware samples to provide security researchers, incident responders, forensic analysts, and the morbidly curious access to samples of live malicious code. Available at: https://virusshare.com/. Accessed on Nov. 2020.

  4. phpMyAdmin: open source administration tool for MySQL. Available in: https://www.phpmyadmin.net/. Accessed on Nov. 2020.

  5. Cuckoo: Automated Malware Analysis. Available in: https://cuckoosandbox.org/. Accessed on Nov. 2020.

  6. URL: Uniform Resource Locator.

  7. TCP: Transmission Control Protocol.

References

Download references

Funding

This study is not financed.

Author information

Authors and Affiliations

Authors

Contributions

WS and WS conceived the presented idea of morphological extreme learning machine. WS developed the theoretical formalism and WS performed the implementation. RP, DS, and SS carried out the experiment. PL, RL, JO, TM constructed the dataset and validated the samples, SL wrote the manuscript with support from SF and EA. All authors discussed the results and contributed to the final manuscript and the interpretation of the results. All authors provided critical feedback and helped shape the research, analysis and manuscript.

Corresponding author

Correspondence to Sidney M. L. Lima.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Animal and human rights

The authors declare that no human participants were involved in this research.

Informed consent

This research did not include healthcare intervention of human participants.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lima, S.M.L., Silva, S.H.M.T., Pinheiro, R.P. et al. Next-generation antivirus endowed with web-server Sandbox applied to audit fileless attack. Soft Comput 27, 1471–1491 (2023). https://doi.org/10.1007/s00500-022-07447-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-022-07447-4

Keywords

Navigation