International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 7, Issue 2 (March-April 2025) Submit your research before last 3 days of April to publish your research paper in the issue of March-April.

Survey On Evasion Techniques: Dynamic Loading & Polymorphic Evasion In C2 Environment

Author(s) Pratik. S. Yawale, Sushant D. Raut, Sushant S. Khond, Apeksha A. Kherde, Shravani S. Wankhade
Country India
Abstract As cyber attackers increasingly rely on sophisticated techniques to maintain control over compromised systems, evasion methods such as dynamic loading and polymorphic evasion have become pivotal in thwarting modern security mechanisms. This survey paper explores the advanced tactics used in Command and Control (C2) environments, where attackers control compromised systems through hidden channels. Dynamic loading allows malicious code to be injected into memory at runtime, avoiding detection by traditional security tools that scan static code. In parallel, polymorphic evasion enables malware to continually alter its code signature, evading signature-based
detection systems. This paper examines the functionality of these techniques, reviews case studies of their use in real-world C2 operations, and analyzes their impact on cybersecurity defenses. Additionally, we evaluate current detection mechanisms and discuss future research directions for developing robust countermeasures against these evolving threats. Understanding these evasion methods is critical for enhancing the detection and mitigation of advanced persistent threats (APTs) and improving the security of modern network environments.
Field Computer Applications
Published In Volume 7, Issue 1, January-February 2025
Published On 2025-02-23
DOI https://doi.org/10.36948/ijfmr.2025.v07i01.37602
Short DOI https://doi.org/g854h2

Share this