Tracking Malware using Internet Activity Data
نویسندگان
چکیده
Forensic Investigation into security incidents often includes the examination of huge lists of internet activity gathered from a suspect computer. In today’s age of increased internet usage, the internet activity log on any given system could produce a huge list of websites. This, couples with the fact that a huge percentage of malware is now distributed via the internet, often through compromised websites, means that valuable clues regarding the source and identity of malware infections are often hidden within the internet activity logs on a computer. While a multitude of tools exist to extract internet activity data from a host computer, most do not filter this activity data. As a result, an investigator could be faced with thousands of website URL’s to sift through for clues regarding malware infection. In this paper, we discuss some of the ways that computers are infected, and why internet activity data is an important resource that must be analyzed in a forensic investigation. We then present a tool that utilizes the Google Safe Browsing Lookup API, which is an extension of the broader Google Safe Browsing API, to do quick lookups on long lists of URL’s and significantly narrow the list to enable the investigator to conduct a more efficient investigation. KeywordsMalware Investigation, Internet Activity Data, Google
منابع مشابه
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities
Malware has been recognized as one of the major security threats in the Internet. Previous researches have mainly focused on malware’s internal activity in a system. However, it is crucial that the malware analysis extracts a malware’s external activity toward the network to correlate with a security incident. We propose a novel way to analyze malware: focus closely on the malware’s external (i...
متن کاملBOTMAGNIFIER: Locating Spambots on the Internet
Unsolicited bulk email (spam) is used by cybercriminals to lure users into scams and to spread malware infections. Most of these unwanted messages are sent by spam botnets, which are networks of compromised machines under the control of a single (malicious) entity. Often, these botnets are rented out to particular groups to carry out spam campaigns, in which similar mail messages are sent to a ...
متن کاملTartarus: A honeypot based malware tracking and mitigation framework
On a daily basis many of the hosts connected to the Internet experience continuous probing and attack from malicious entities. Detection and defence from these malicious entities has primarily been the concern of Intrusion Detection Systems, Intrusion Prevention Systems and Anti-Virus software. These systems rely heavily on known signatures to detect nefarious traffic. Due to the reliance on kn...
متن کاملToward Revealing Kernel Malware Behavior in Virtual Execution Environments
Using a sandbox for malware analysis has proven effective in helping people quickly understand the behavior of unknown malware. This technique is also complementary to other malware analysis techniques such as static code analysis and debugger-based code analysis. This paper presents Rkprofiler, a sandbox-based malware tracking system that dynamically monitors and analyzes the behavior of Windo...
متن کاملDroidTrack: Tracking and Visualizing Information Diffusion for Preventing Information Leakage on Android
An Android app can collaborate with other apps by using an intent. It can also control personal information or use permissions granted by a user. However, users cannot detect when their apps communicates with other apps. Therefore, they might not be aware of any information leakage if an app happens to be malware. In this paper, we propose a method for tracking and visualizing the diffusion of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012