Filters








1,580 Hits in 4.4 sec

Towards Automated Malware Behavioral Analysis and Profiling for Digital Forensic Investigation Purposes [chapter]

Ahmed F. Shosha, Joshua I. James, Alan Hannaway, Chen-Ching Liu, Pavel Gladyshev
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
The method is implemented in a prototype malware analysis environment to automate the process of profiling malicious kernel objects and assist malware forensic investigation.  ...  In this research, the limitations of the use of current dynamic malware analysis methods in digital forensic investigations are highlighted.  ...  In addition, it can be extended to profile different behavioral aspects of malware execution, and allow an investigator to automate the process of malware traces detection in a post-mortem forensic analysis  ... 
doi:10.1007/978-3-642-39891-9_5 fatcat:lo3t3fjpmzggvbq44kmjiprrve

A STUDY ON DIGITAL FORENSICS USING VARIOUS ALGORITHMS FOR MALWARE DETECTION

Dr. Anjana Pandey
2018 International Journal of Advanced Research in Computer Science  
This paper has a survey and analysis of various research works on Malware Detection using behavior characteristics and also introduces its problems and issues.  ...  Although each malware is unique, malware has some common behavioral characteristics which can be examined and used for malware detection.  ...  Malicious behavior detection is to find the unique characteristics of malware by analysis of the behavior and semantic information.  ... 
doi:10.26483/ijarcs.v9i3.6084 fatcat:wzj3zxc6tffvdozi7guuircnyu

Analysis of Conti Ransomware Attack on Computer Network with Live Forensic Method

Rusydi Umar, Imam Riadi, Ridho Surya Kusuma
2021 IJID (International Journal on Informatics for Development)  
stage is analysing malware by using statistical and dynamic analysis.  ...  The working principle of this Ransomware acts by utilizing Registry Query, which covers all forms of behavior in accessing, deleting, creating, manipulating data, and communicating with C2 (Command and  ...  ACKNOWLEDGMENT Thank to Universitas Ahmad Dahlan Yogyakarta for the support and facilitation of this research.  ... 
doi:10.14421/ijid.2021.2423 fatcat:alm2nz43brf5zpus7bf6dsvylu

REVERSE ENGINEERING ANALYSIS FORENSIC MALWARE WEBC2-DIV

Raditya Faisal Waliulu, Teguh Hidayat Iskandar Alam
2018 KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)  
A few steps there are scanning, suspected packet in network and analysis of malware behavior and dissambler body malware.Keyword : forensic malware, Analysis, Advance Presistent Threat, Cyberwar, dissambler  ...  Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact.  ...  A few malware forensic tools can show value hidden malware is. In addition, forensic techniques on various tools and plugins more than avoidance analysis techniques.  ... 
doi:10.30865/komik.v2i1.902 fatcat:linjttjaancfxbqopb42wi57s4

Multi-Environment Analysis System for Evaluating the Impact of Malicious Web Sites Changing Their Behavior

Yoshiaki SHIRAISHI, Masaki KAMIZONO, Masanori HIROTOMO, Masami MOHRI
2017 IEICE transactions on information and systems  
To authors' knowledge, there is no study of utilizing analysis results of malicious web sites for digital forensic on the incident and hedging the risk of expected incident in the organization.  ...  In the case of drive-by download attacks, most malicious web sites identify the software environment of the clients and change their behavior.  ...  We have evaluated the impact of malicious web sites by traffic log analysis, content analysis and malware communication and behavior analysis for characteristic three cases of behavior of web sites posted  ... 
doi:10.1587/transinf.2016ofk0001 fatcat:bnyzovugfzeqbhyqvud4klv6ku

Reverse Engineering Reverse Engineering Analysis Forensic Malware WEBC2-Div

Raditya Faisal Waliulu
2018 Journal of Informatics Information System Software Engineering and Applications (INISTA)  
A few steps there are scanning, suspected packet in network and analysis of malware behavior and disassembler body malware.  ...  Lately, malware attack as a form espionage (cyberwar) one of the most topic on security internet, because of has massive impact.  ...  A few malware forensic tools can show value hidden malware is. In addition, forensic techniques on various tools and plugins more than avoidance analysis techniques.  ... 
doi:10.20895/inista.v1i1.10 fatcat:q3gswswhxrh6bldtyeewd4yqsm

FIViz: Forensics Investigation through Visualization for Malware in Internet of Things

Israr Ahmad, Munam Ali Shah, Hasan Ali Khattak, Zoobia Ameer, Murad Khan, Kijun Han
2020 Sustainability  
Our contribution in this work is twofold. Firstly, we create a data set through a dynamic behavioral analysis of 400 malware samples.  ...  Adoption of the Internet of Things for the realization of smart cities in various domains has been pushed by the advancements in Information Communication and Technology.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/su12187262 fatcat:c7krpf3h7fheni3gjl2m4jufk4

A Literature Review of Historical and Detection Analysis of Botnets Forensics

Ade Kurniawan, Ahmad Fitriansyah
2018 International Journal of Computer and Communication Engineering  
On the spectrum of Forensic Analysis, it is divided into three important aspects: Forensic Analysis Botnet from Software aspect, Forensic Analysis Botnet from Detection aspect, and Botnet Forensic Analysis  ...  Hence, this paper will present the two most important spectrums in the Botnet: Historical and Forensic Analysis Botnet.  ...  Acknowledgment We are grateful to thank you for support from Universal University, Batam, Indonesia.  ... 
doi:10.17706/ijcce.2018.7.4.128-135 fatcat:aww4rz3n5jeclacu7wein3tziy

APK Auditor: Permission-based Android malware detection system

Kabakus Abdullah Talha, Dogru Ibrahim Alper, Cetin Aydin
2015 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
analysis requests, and (3) a central server responsible for communicating with both signature database and smartphone client and managing whole analysis process.  ...  Digital investigators need to be on the alert for the presence of malware when examining Android devices, and can benefit from supporting tools that help them understand the capabilities of such malicious  ...  "the number of mobile threats that track users doubled in 2013 and mobile malware seemed almost solely focused on the Android platform" (Internet Security Threat Report, 2014).  ... 
doi:10.1016/j.diin.2015.01.001 fatcat:kjy3klj2ango3abu4wpt6npzt4

Identification of common parameters for classifying malwares with decision tree

Aparna Verma, Dr. M.S Rao, Dr. A.K Gupta
2014 IOSR Journal of Computer Engineering  
Malware analysis is a very tedious and time consuming process. It is the process of determining the behavior and purpose of a given malware sample created by the hacker.  ...  The purpose of this paper is to help Information security professionals, students and peoples, forensic investigator to understand the nature of malwares, and classify them according to the parameters  ...  It is a very challenging task for the forensic investigator to perform behavior analysis of malwares which is a time consuming process.  ... 
doi:10.9790/0661-16384346 fatcat:z4zddvpnhzccfilie4oa6wt5sy

A brief overview of ransomware behavior analysis challenges / Uma breve visão geral dos desafios da análise do comportamento do resgate de bens

João Vitor Assis Ribeiro
2022 Brazilian Journal of Development  
In this light, malware behavior analysis plays a crucial role in the development of proper prevention and detection technology and is the cornerstone of an effective incident response practice.  ...  By leveraging vulnerable and insecure software and using social engineering, cybercriminals have found a wide opportunity for considerable profit in the thriving age of digital businesses and cyber currency  ...  CONCLUSION An effective behavior analysis of ransomware is one that faces many challenges but can also take advantage of the intrinsic characteristics of this type of malware that are strongly tied to  ... 
doi:10.34117/bjdv8n5-365 fatcat:tjslt4wj7bf57ijdxpbl2lopka

BOTNET FORENSIC: ISSUES, CHALLENGES AND GOOD PRACTICES

Anchit Bijalwan, Vijender Kumar Solanki, Emmanuel Shubhakar Pilli
2018 Network Protocols and Algorithms  
This paper enlightens the novel summary of previous survey including life cycle, classification, framework, detection, analysis and the challenges for botnet forensics.  ...  Unethical hacking of sites, probing, click frauds, phishing, denial of services attack and many such malicious practices affects the organizational integrity and sovereignty.  ...  [6] explained physical memory is stored on target system from where the evidence can be captured and collected in live forensic [6] [7] [8] . Malware forensics is the analysis of malware.  ... 
doi:10.5296/npa.v10i2.13144 fatcat:4jslahx72nhobnabo25scj3yzi

New Malware Analysis Method on Digital Forensics

Sunghyuck Hong Sunghyuck.hong@gmail.com, Sungjin Lee
2015 Indian Journal of Science and Technology  
The number of Malware occurrence has rapidly increased and new or various types of Malware have been advanced and progressed, so it is time to require analysis for malicious codes in order to defense system  ...  However, current defense mechanisms are always one step behind of Malware attacks and there is not much research on Malware analysis. The behavior of Malware is similar to common applications.  ...  This paper developed a Malware behavioral analysis tool, Taiwan Malware Analysis Net, which can analysis the varietal Malware and output analysis report.  ... 
doi:10.17485/ijst/2015/v8i17/77209 fatcat:eeqvhm7v4nc5pe3ghzghyj6ecu

Identifying Malware Using Cross-Evidence Correlation [chapter]

Anders Flaglien, Katrin Franke, Andre Arnes
2011 IFIP Advances in Information and Communication Technology  
Digital forensic processes are followed to ensure evidence integrity and chain of custody.  ...  This paper proposes a new correlation method for the automatic identification of malware traces across multiple computers.  ...  Interested readers are referred to [9] for a comparative analysis of digital forensic storage and exchange formats.  ... 
doi:10.1007/978-3-642-24212-0_13 fatcat:tn33viby55b2jlg2bliel5o4d4

Tools and Techniques for Malware Detection and Analysis [article]

Sajedul Talukder
2020 arXiv   pre-print
One of the major and serious threats that the Internet faces today is the vast amounts of data and files which need to be evaluated for potential malicious intent.  ...  This survey paper provides an overview of techniques and tools for detecting and analyzing the malware.  ...  Hybrid Analysis Online malware analysis tool Memory Forensics Tools IRMA An asynchronous and customizable analysis plat- form for suspicious files DAMM Differential Analysis of Malware in Memory  ... 
arXiv:2002.06819v2 fatcat:mekiawuu4fgzdedjthtq3v44hm
« Previous Showing results 1 — 15 out of 1,580 results