Raj chaganti

and 3 more

Malware distribution to the victim network is commonly performed through file attachments in phishing email or downloading illegitimate files from the internet, when the victim interacts with the source of infection. To detect and prevent the malware distribution in the victim machine, the existing end device security applications may leverage sophisticated techniques such as signature-based or anomaly-based, machine learning techniques. The well-known file formats Portable Executable (PE) for Windows and Executable and Linkable Format (ELF) for Linux based operating system are used for malware analysis and the malware detection capabilities of these files has been well advanced for real time detection. But the malware payload hiding in multimedia like cover images using steganography detection has been a challenge for enterprises, as these are rarely seen and usually act as a stager in sophisticated attacks. In this article, to our knowledge, we are the first to try to address the knowledge gap between the current progress in image steganography and steganalysis academic research focusing on data hiding and the review of the stegomalware (malware payload hiding in images) targeting enterprises with cyberattacks current status. We present the stegomalware history, generation tools, file format specification description. Based on our findings, we perform the detail review of the image steganography techniques including the recent Generative Adversarial Networks (GAN) based models and the image steganalysis methods including the Deep Learning opportunities and challenges in stegomalware generation and detection are presented based on our findings.

vinayakumar R

and 6 more

Deep Learning (DL), a novel form of machine learning (ML) is gaining much research interest due to its successful application in many classical artificial intelligence (AI) tasks as compared to classical ML algorithms (CMLAs). Recently, DL architectures are being innovatively modelled for diverse applications in the area of cyber security. The literature is now growing with DL architectures and their variations for exploring different innovative DL models and prototypes that can be tailored to suit specific cyber security applications. However, there is a gap in literature for a comprehensive survey reporting on such research studies. Many of the survey-based research have a focus on specific DL architectures and certain types of malicious attacks within a limited cyber security problem scenario of the past and lack futuristic review. This paper aims at providing a well-rounded and thorough survey of the past, present, and future DL architectures including next-generation cyber security scenarios related to intelligent automation, Internet of Things (IoT), Big Data (BD), Blockchain, cloud and edge technologies. This paper presents a tutorial-style comprehensive review of the state-of-the-art DL architectures for diverse applications in cyber security by comparing and analysing the contributions and challenges from various recent research papers. Firstly, the uniqueness of the survey is in reporting the use of DL architectures for an extensive set of cybercrime detection approaches such as intrusion detection, malware and botnet detection, spam and phishing detection, network traffic analysis, binary analysis, insider threat detection, CAPTCHA analysis, and steganography. Secondly, the survey covers key DL architectures in cyber security application domains such as cryptography, cloud security, biometric security, IoT and edge computing. Thirdly, the need for DL based research is discussed for the next generation cyber security applications in cyber physical systems (CPS) that leverage on BD analytics, natural language processing (NLP), signal and image processing and blockchain technology for smart cities and Industry 4.0 of the future. Finally, a critical discussion on open challenges and new proposed DL architecture contributes towards future research directions.

Ajay Arunachalam

and 1 more

Peer-to-Peer (P2P) Networking have a lot of practical applicability’s over the years. File storage and resource sharing are few key areas among the others where such peered network architecture is widely successful. The common building block for P2P networking is to store or locate an identifiable resource, for which there are basically 3 approaches namely (1) local storage/broadcast search (2) global storage/local search (3) distributed storage/distributed search. With the development of mobile hardware and wireless technology, it further became feasible to use mobile devices in these P2P networks. This computing architecture is widely used in Mobile Ad-hoc Network (MANET) for building content sharing applications. Search algorithm and file transfer schemes are the basic components of such content sharing systems. In this article, we provide a brief overview of the resource discovery approaches for peer-to-peer file sharing applications over MANET. We analyze and classify the search techniques into 4 broad schemes, mainly the flooding-based schemes, Distributed Hash Table (DHT) based schemes, advertisement-based schemes, and social network-based schemes. The pros and cons of each technique is summarized. Further, a one-to-one comparison is done across the classes for quick interpretation. We also outline the various issues, and complications that should be taken into consideration while designing any resource discovery algorithm. Further, we briefly discuss the security threats, and present state-of-the-art countermeasures for it. Also, we highlight some important guidelines that need to be focused while designing efficient file sharing applications and services in Mobile Edge Computing (MEC) enabled networks. Comprehensive and in-depth assessments of the related approaches are presented providing clear insights for the future research directions.

Ajay Arunachalam

and 1 more

Resource discovery is an important fundamental aspect and a crucial task in Mobile Peer-to-Peer Networks (MP2P). To compliment network dynamics and churn, the unstructured search architecture is widely used. The key goal of an efficient search scheme is to find the required resource with minimal search latency, low overhead, and low power consumption to better suit the nature of mobile nodes where resource constraints are the major bottleneck. Resource discovery thus becomes an integral part of the distributed architecture and resource sharing systems. In the past, many resource discovery strategies are proposed for Mobile P2P networks. A schematic and tabular classification of these systems enables one to review the existing works under one umbrella. This article presents an overview of such several different schemes for performing resource discovery in the MP2P network broadly classified under six different categories, i.e., centralized, unstructured, structured, super node based, hybrid, and other general lookup schemes. We also give a brief comparison of P2P, MANET, and P2P MANETs. Further, we discuss various routing schemes in such an evolving network. In this survey, we study and review the existing resource discovery techniques in MP2P systems. The classification of each scheme with their advantages and disadvantages are discussed. We highlight a few open research issues, and brief the role of network topology and its structure on the performance of the resource search protocols. Further, we also glimpse on the security threats in MP2P networks and suggest their countermeasures. And, finally, a summary of each method is given, along with their lookup complexities.