All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Multistage Malware Detection Method for Backup Systems

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216224%3A14330%2F24%3A00139890" target="_blank" >RIV/00216224:14330/24:00139890 - isvavai.cz</a>

  • Result on the web

    <a href="https://doi.org/10.3390/technologies12020023" target="_blank" >https://doi.org/10.3390/technologies12020023</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.3390/technologies12020023" target="_blank" >10.3390/technologies12020023</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Multistage Malware Detection Method for Backup Systems

  • Original language description

    This paper proposes an innovative solution to address the challenge of detecting latent malware in backup systems. The proposed detection system utilizes a multifaceted approach that combines similarity analysis with machine learning algorithms to improve malware detection. The results demonstrate the potential of advanced similarity search techniques, powered by the Faiss model, in strengthening malware discovery within system backups and network traffic. Implementing these techniques will lead to more resilient cybersecurity practices, protecting essential systems from hidden malware threats. This paper’s findings underscore the potential of advanced similarity search techniques to enhance malware discovery in system backups and network traffic, and the implications of implementing these techniques include more resilient cybersecurity practices and protecting essential systems from malicious threats hidden within backup archives and network data. The integration of AI methods improves the system’s efficiency and speed, making the proposed system more practical for real-world cybersecurity. This paper’s contribution is a novel and comprehensive solution designed to detect latent malware in backups, preventing the backup of compromised systems. The system comprises multiple analytical components, including a system file change detector, an agent to monitor network traffic, and a firewall, all integrated into a central decision-making unit. The current progress of the research and future steps are discussed, highlighting the contributions of this project and potential enhancements to improve cybersecurity practices.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>imp</sub> - Article in a specialist periodical, which is included in the Web of Science database

  • CEP classification

  • OECD FORD branch

    20203 - Telecommunications

Result continuities

  • Project

    <a href="/en/project/VK01030030" target="_blank" >VK01030030: Data backup and storage system with integrated active protection against cyber threats</a><br>

  • Continuities

    P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)

Others

  • Publication year

    2024

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    TECHNOLOGIES

  • ISSN

    2227-7080

  • e-ISSN

    2227-7080

  • Volume of the periodical

    12

  • Issue of the periodical within the volume

    2

  • Country of publishing house

    CH - SWITZERLAND

  • Number of pages

    16

  • Pages from-to

    1-16

  • UT code for WoS article

    001172262100001

  • EID of the result in the Scopus database

    2-s2.0-85185923905