2018
DOI: 10.1007/978-3-319-99828-2_16
|View full text |Cite
|
Sign up to set email alerts
|

Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic

Abstract: Stealthy malware hides its presence from the users of a system by hooking the relevant libraries, drivers, system calls or manipulating the services commonly used to monitor system behaviour. Tampering the network sensors of host-based intrusion detection systems (HIDS) may impair their ability to detect malware and significantly hinders subsequent forensic investigations. Nevertheless, the mere attempt to hide the traffic indicates malicious intentions. In this paper we show how comparison of the data collect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 5 publications
0
1
0
Order By: Relevance
“…Anti-forensics and Malware 7 [19,[215][216][217][218][219][220] Authors such us I. You et al [215] discuss the anti-forensic aspect of obfuscation as applied to malware.…”
Section: Anti-forensics and Malware Number Of Studies Referencesmentioning
confidence: 99%
See 2 more Smart Citations
“…Anti-forensics and Malware 7 [19,[215][216][217][218][219][220] Authors such us I. You et al [215] discuss the anti-forensic aspect of obfuscation as applied to malware.…”
Section: Anti-forensics and Malware Number Of Studies Referencesmentioning
confidence: 99%
“…M. Agarwal et al [218] propose a method of detecting the anti-forensic technique of tampering with network sensors of host-based intrusion detection systems (HIDS).…”
Section: Anti-forensics and Malware Number Of Studies Referencesmentioning
confidence: 99%
See 1 more Smart Citation
“…This requires that all nations have the ability to collect, preserve and examine digital evidence for their own needs as well as for the potential needs of other nations. Digital Forensics is the scientific study of the processes involved in the recovery, preservation and examination of digital evidence, including audio, imaging and communication devices with consideration of forensic evasion techniques [11]. The efforts of the working group in digital forensics strive to discover, define and foster fundamental scientific principles that support the investigation of digital wrongdoings from all perspectives, legal, business and military.…”
Section: Digital Forensicsmentioning
confidence: 99%