2011
DOI: 10.1117/12.883457
|View full text |Cite
|
Sign up to set email alerts
|

Behavioral analysis of malicious code through network traffic and system call monitoring

Abstract: Malicious code (malware) that spreads through the Internet-such as viruses, worms and trojans-is a major threat to information security nowadays and a profitable business for criminals. There are several approaches to analyze malware by monitoring its actions while it is running in a controlled environment, which helps to identify malicious behaviors. In this article we propose a tool to analyze malware behavior in a non-intrusive and effective way, extending the analysis possibilities to cover malware samples… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…The instrument used for collecting the data is a monitoring agent prototype dubbed "Sonar". It runs as part of the Windows kernel and utilizes SSDT hooking [14,15] to remain undetected. Sonar collects process, thread, image load, file, registry, and network events in the form of abstracted API and system calls.…”
Section: Observation: Data Collection and Processingmentioning
confidence: 99%
“…The instrument used for collecting the data is a monitoring agent prototype dubbed "Sonar". It runs as part of the Windows kernel and utilizes SSDT hooking [14,15] to remain undetected. Sonar collects process, thread, image load, file, registry, and network events in the form of abstracted API and system calls.…”
Section: Observation: Data Collection and Processingmentioning
confidence: 99%
“…One of the first projects using this technique was the NTRegmon by Russinovich and Cogswell [12], which monitors all registry activity on a system. It also shows that SSDT-Hooking can be used with a non-malicious intent, for example many antivirus and malware detection systems [19] depend on this technique too. Detection -This technique is similar to its counterpart in the user-mode, consequently it can also be detected in a similar way.…”
Section: Ssdt-hookingmentioning
confidence: 99%
“…Fukushima's system utilizes Procmon [126] as primary data provider. Unlike BehEMOT's postmonitoring abstraction [60], Procmon abstracts system calls in a non-transparent manner prior to analysis. For this reason, many additional calls are not considered.…”
Section: Malware Analysis Solutionsmentioning
confidence: 99%
“…The VM-based dynamic analysis system is built around the TRUMAN sandnet [40] that logs contacted IP addresses, created, changed, and deleted files, as well as registry activity. While some features are taken from CWSandbox [142], others are comparable to the generally more detailed BehEMOT approach [60]. The file output is akin to a list of changes to the original system state.…”
Section: Malware Analysis Solutionsmentioning
confidence: 99%
See 1 more Smart Citation