A new approach to malware detection by comparative analysis of data structures in a memory image
M Aghaeikheirabady, SMR Farshchi… - 2014 International …, 2014 - ieeexplore.ieee.org
M Aghaeikheirabady, SMR Farshchi, H Shirazi
2014 International Congress on Technology, Communication and …, 2014•ieeexplore.ieee.orgPhysical memory forensic «has grown in popularity in recent years. Since malware typically
operate in user space, it is important to reconstruct and track their process behavior. This
paper focuses on detecting malware through a comparison of the information in the user
space memory data structures. In order to expedite information extraction and ensure
accuracy, the data in multiple memory management structures in the user space and the
kernel are used concurrently. In the proposed methodising descriptions of memory …
operate in user space, it is important to reconstruct and track their process behavior. This
paper focuses on detecting malware through a comparison of the information in the user
space memory data structures. In order to expedite information extraction and ensure
accuracy, the data in multiple memory management structures in the user space and the
kernel are used concurrently. In the proposed methodising descriptions of memory …
Physical memory forensic« has grown in popularity in recent years. Since malware typically operate in user space, it is important to reconstruct and track their process behavior. This paper focuses on detecting malware through a comparison of the information in the user space memory data structures. In order to expedite information extraction and ensure accuracy, the data in multiple memory management structures in the user space and the kernel are used concurrently. In the proposed methodising descriptions of memory structures, weextractmalware artifactsrelated to registry changes as well as, calls to library files and operating system functions. The extracted features are then evaluated, and samples are classified according to the selected attributes. The best results include a 98% detection rate and false positive rate of 16%, which indicates the effectiveness of the proposed behavior extraction method.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果