Please use this identifier to cite or link to this item:
http://dspace.dtu.ac.in:8080/jspui/handle/repository/21230
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | TANYA, AGARWAL | - |
dc.date.accessioned | 2024-12-13T05:04:32Z | - |
dc.date.available | 2024-12-13T05:04:32Z | - |
dc.date.issued | 2024-07 | - |
dc.identifier.uri | http://dspace.dtu.ac.in:8080/jspui/handle/repository/21230 | - |
dc.description.abstract | In our below research, we execute a methodology that filters out file-based and fileless malware from a dataset of malicious Python libraries. We have developed an approach to identify malicious code within these Python libraries. Our approach makes use of static and dynamic analysis in addition to behavioral analysis to accurately distinguish between file-based and fileless Python modules. Further, we analyze the malicious packages that execute fileless processes. This research aims to contribute towards enhancing the security of Python development ecosystems by providing developers and security professionals with tools to identify and mitigate malware threats effectively. We have also discussed some background information on fileless malwares. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartofseries | TD-7584; | - |
dc.subject | SECURITY IN PYTHON DEVELOPMENT ENVIRONMENTS | en_US |
dc.subject | EMBEDDED MALWARE | en_US |
dc.subject | MALICIOUS PYTHON LIBRARIES | en_US |
dc.subject | DETECTION | en_US |
dc.title | ENHANCING SECURITY IN PYTHON DEVELOPMENT ENVIRONMENTS: DETECTION AND ANALYSIS OF THE EMBEDDED MALWARE | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | M.E./M.Tech. Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Tanya Agarwal M.Tech..pdf | 878.69 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.