作者: Hiran V Nath , B M Mehtre
DOI: 10.1109/INDICON.2014.7030520
关键词:
摘要: It is a general belief that executable creates more security risk than any other file types. So most of host based as well network systems are not programed to detect threats in non-executable files. These files includes images, movies and document like office or pdf Moreover, the very huge size, which prevents these scanners from scanning files, since it will take processing power delays mission critical process. But constantly used by all users. users may be naive professional much important for us understand whether could system not. In recent breaches, attackers focusing on usage initiate Advanced Persistent Threats (APTs) multistage attacks. this paper, we analyzing video file, downloaded popular torrent website. Finally, extracting malicious content embedded into it. After analyzing, have found contains link through another gets machine. This considered first stage attack. initiating targeted attacks victim's interest. Here also coming conclusion totally new method compromise system. paper explaining one followed attacker. aim attacker was infect machines with an adware.