Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/21230
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTANYA, AGARWAL-
dc.date.accessioned2024-12-13T05:04:32Z-
dc.date.available2024-12-13T05:04:32Z-
dc.date.issued2024-07-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/21230-
dc.description.abstractIn our below research, we execute a methodology that filters out file-based and fileless malware from a dataset of malicious Python libraries. We have developed an approach to identify malicious code within these Python libraries. Our approach makes use of static and dynamic analysis in addition to behavioral analysis to accurately distinguish between file-based and fileless Python modules. Further, we analyze the malicious packages that execute fileless processes. This research aims to contribute towards enhancing the security of Python development ecosystems by providing developers and security professionals with tools to identify and mitigate malware threats effectively. We have also discussed some background information on fileless malwares.en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD-7584;-
dc.subjectSECURITY IN PYTHON DEVELOPMENT ENVIRONMENTSen_US
dc.subjectEMBEDDED MALWAREen_US
dc.subjectMALICIOUS PYTHON LIBRARIESen_US
dc.subjectDETECTIONen_US
dc.titleENHANCING SECURITY IN PYTHON DEVELOPMENT ENVIRONMENTS: DETECTION AND ANALYSIS OF THE EMBEDDED MALWAREen_US
dc.typeThesisen_US
Appears in Collections:M.E./M.Tech. Information Technology

Files in This Item:
File Description SizeFormat 
Tanya Agarwal M.Tech..pdf878.69 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.