A Collection of Information Security Community Standardization Activities and Initiatives |
|||||
Section Contents Items of Interest |
Malware ProtectionAttackers, ranging from script kiddies to hacktivists to criminals to nations states, use malware to gain access to an organization’s network infrastructure. Once inside the network, these attackers may try to deface systems, gather personal and proprietary information, or deny legitimate users access to resources. Most organizations deploy anti-virus software, but this approach is not effective against targeted attacks that exploit zero-day vulnerabilities and use sophisticated stealth techniques. Having a common way to describe malware in terms of its behavior and other attributes, such as the Malware Attribute Enumeration and Characterization (MAEC) language, helps organizations better protect themselves from malware attacks. Malware researchers can more readily integrate and correlate information from multiple static and dynamic analysis tools to create better indicators to detect the presence of malware which can be deployed as intrusion detection system signatures on the network, or as host-based checks using Open Vulnerability and Assessment Language (OVAL) or Open Indicators of Compromise (OpenIOC). To aid an organization in overall enterprise vulnerability management, malware can be linked to the common vulnerabilities (CVE) or common weaknesses (CWE) that it exploits, the type of attacks patterns that malware automate (CAPEC), and the types of assets/platforms that are risk, e.g., using the Common Platform Enumeration (CPE) or Software ID Tags (SWIDs). |
||||
This website is sponsored and managed by The MITRE Corporation to enable stakeholder collaboration. Copyright © 2007–2024 The MITRE Corporation. MITRE, the MITRE logo, CVE, and the CVE logo are registered trademarks and the Making Security Measurable logo, CWE, the CWE logo, CAPEC, the CAPEC logo, MAEC, the MAEC logo, CWSS, the CWSS logo, CWRAF, the CWRAF logo, and Recommendation Tracker are trademarks of The MITRE Corporation. All other trademarks are the property of their respective owners. All other trademarks are the property of their respective owners. Contact us: measurablesecurity@mitre.org Page Last Updated: October 18, 2012 |