首页> 外文期刊>Information Security Technical Report >A proactive malicious software identification approach for digital forensic examiners
【24h】

A proactive malicious software identification approach for digital forensic examiners

机译:一种针对数字取证检查员的主动恶意软件识别方法

获取原文
获取原文并翻译 | 示例
           

摘要

Digital investigators often get involved with cases, which seemingly point the responsibility to the person to which the computer belongs, but after a thorough examination malware is proven to be the cause, causing loss of precious time. Whilst Anti-Virus (AV) software can assist the investigator in identifying the presence of malware, with the increase in zero-day attacks and errors that exist in AV tools, this is something that cannot be relied upon. The aim of this paper is to investigate the behaviour of malware upon various Windows operating system versions in order to determine and correlate the relationship between malicious software and OS artifacts. This will enable an investigator to be more efficient in identifying the presence of new malware and provide a starting point for further investigation.The study analysed several versions of the Windows operating systems (Windows 7, 8.1 and 10) and monitored the interaction of 90 samples of malware (across three categories of the most prevalent (Trojan, Worm, and Bot) and 90 benign samples through the Windows Registry. Analysis of the interactions has provided a rich source of knowledge about how various forms of malware interact with key areas of the Registry. Using this knowledge, the study sought to develop an approach to predict the presence and type of malware present through an analysis of the Registry. To this end, different classifiers such as Neural Network, Random forest, Decision tree, Boosted tree and Logistic regression were tested. It was observed that Boosted tree was resulting in a correct classification of over 72% - providing the investigator with a simple approach to determining which type of malware might be present independent and faster than an Antivirus. The modelling of these findings and their integration in an application or forensic analysis within an existing tool would be useful for digital forensic investigators. (C) 2019 Elsevier Ltd. All rights reserved.
机译:数字调查人员经常卷入案件,这似乎将责任归咎于计算机所属的人,但是经过彻底检查,事实证明恶意软件是原因,导致浪费了宝贵的时间。尽管反病毒(AV)软件可以帮助调查人员识别恶意软件的存在,但随着零日攻击和AV工具中存在的错误的增加,这是不能依靠的。本文的目的是调查各种Windows操作系统版本上的恶意软件行为,以确定并关联恶意软件和OS工件之间的关系。这将使调查人员能够更有效率地识别新恶意软件的存在,并为进一步调查提供起点。该研究分析了Windows操作系统的多个版本(Windows 7、8.1和10)并监视了90个样本的交互。 Windows注册表中的恶意软件(跨三类最流行的(特洛伊木马,蠕虫和僵尸计算机)和90个良性样本)。对交互的分析提供了丰富的知识来源,了解各种形式的恶意软件如何与恶意软件的关键区域进行交互注册表:利用这些知识,本研究寻求开发一种通过对注册表进行分析来预测恶意软件的存在和类型的方法,为此,使用了不同的分类器,例如神经网络,随机森林,决策树,Boosted树和Logistic。对回归进行了测试,发现Boosted树的正确分类率超过72%,这为研究人员提供了一种简单的方法确定哪种类型的恶意软件可能比杀毒软件独立存在并且速度更快。这些调查结果的建模及其在现有工具中的应用程序或法医分析中的集成对于数字法医研究人员将非常有用。 (C)2019 Elsevier Ltd.保留所有权利。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号