Optimised Malware Detection in Digital Forensics
نویسنده
چکیده
On the Internet, malware is one of the most serious threats to system security. Most complex issues and problems on any systems are caused by malware and spam. Networks and systems can be accessed and compromised by malware known as botnets, which compromise other systems through a coordinated attack. Such malware uses anti-forensic techniques to avoid detection and investigation. To prevent systems from the malicious activity of this malware, a new framework is required that aims to develop an optimised technique for malware detection. Hence, this paper demonstrates new approaches to perform malware analysis in forensic investigations and discusses how such a framework may be developed.
منابع مشابه
Malware Analysis & its Application to Digital Forensic
In this paper we present study about how to analyze the malware on the system for digital investigation and also give the superficial knowledge and comparison about forensic model. This paper proposes a plan for achieving a dramatic improvement in research and operational efficiency through the adoption of systematic approaches for representing forensic data and performing forensic computation....
متن کاملApproximate Search for Big Data with Applications in Information Security – a Survey
Abstract: This paper is a survey of approximate search techniques in very large data sets (so-called Big Data). After a short introduction, some techniques for speeding up approximate search in such data sets based on exploitation of inherent bit-parallelism in computers are described. It then reviews the applications in search related to information security problems (digital forensics, malwar...
متن کاملThe impact of GPU-assisted malware on memory forensics: A case study
In this paper we assess the impact of GPU-assisted malware on memory forensics. In particular, we first introduce four different techniques that malware can adopt to hide its presence. We then present a case study on a very popular family of Intel GPUs, and we analyze in which cases the forensic analysis can be performed using only the host’s memory and in which cases it requires access to the ...
متن کاملAcceleration of Statistical Detection of Zero-day Malware in the Memory Dump Using CUDA-enabled GPU Hardware
This paper focuses on the anticipatory enhancement of methods of detecting stealth software. Cyber security detection tools are insufficiently powerful to reveal the most recent cyber-attacks which use malware. In this paper, we will present first an idea of the highest stealth malware, as this is the most complicated scenario for detection because it combines both existing anti-forensic techni...
متن کاملExploring the Malware Analysis Landscape for Forensic Investigation
The computer crime explosion in World Wide Web has increased in both commercial and personal areas. Study of poor users; provide valuable information in their system to their individual needs or for the efficient organization. Among the several attacking approaches like virus, worm, Trojan horse etc. to extract confidential data from particular victim system, this paper uses malware analysis of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014