Optimised Malware Detection in Digital Forensics
نویسندگان
چکیده
منابع مشابه
Optimised Malware Detection in Digital Forensics
On the Internet, malware is one of the most serious threats to system security. Most complex issues and problems on any systems are caused by malware and spam. Networks and systems can be accessed and compromised by malware known as botnets, which compromise other systems through a coordinated attack. Such malware uses anti-forensic techniques to avoid detection and investigation. To prevent sy...
متن کاملMalware Forensics by Automatic Experiments
When dealing with malware infections, one of the first tasks is to find the processes that were involved in the attack. We introduce Malfor, a system that isolates those processes automatically. In contrast to other methods that help analyze attacks, Malfor works by experiments: first, we record the interaction of the system under attack; after the intrusion has been detected, we replay the rec...
متن کاملResampling Detection for Digital Image Forensics
A virtually unavoidable consequence of manipulations on digital images are statistical correlations introduced between the pixels. These correlations may not be visible to a human, but can be detected by statistical techniques. This paper presents a machine learning based approach to image resampling detection based on the detector by Popescu and Farid. We investigate ways to improve robustness...
متن کاملDigital Forensics to Intelligent Forensics
In this paper we posit that current investigative techniques—particularly as deployed by law enforcement, are becoming unsuitable for most types of crime investigation. The growth in cybercrime and the complexities of the types of the cybercrime coupled with the limitations in time and resources, both computational and human, in addressing cybercrime put an increasing strain on the ability of d...
متن کاملDetecting Objective-C Malware through Memory Forensics
Memory forensics is increasingly used to detect and analyze sophisticated malware. In the last decade, major advances in memory forensics have made analysis of kernel-level mal-ware straightforward. Kernel-level malware has been favored by attackers because it essentially provides complete control over a machine. This has changed recently as operating systems vendors now routinely enforce drivi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Network Security & Its Applications
سال: 2014
ISSN: 0975-2307,0974-9330
DOI: 10.5121/ijnsa.2014.6101