2016
DOI: 10.15439/2016f490
|View full text |Cite
|
Sign up to set email alerts
|

Developing malware evaluation infrastructure

Abstract: Abstract-Malware evaluation is a key factor in security. It supposed to be safe and accurate. The contemporary malware is very sophisticated. Usually it uses complex distributed infrastructure an investigation of which is a very challenging task. In the paper, the development of the testbeds toward malware and its infrastructure evaluation is presented. Based on the real-life experience with the subsequent CryptoWall generations analysis, the MESS evaluation system is introduced. A rich set of analytical resul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Cabaj et al [11] investigated six CryptoWall samples dynamically, focussing on the network activity, which allowed the tracking of infected proxies and the infrastructure behind the infection. This work was furthered in [12] with an expanded dataset (350 instances). In this work, multiple domain names resolved to the same IP addresses were found to be responsible for multiple C&C services Scaife et al [13] employed dynamic analysis on 492 ransomware samples from 14 families.…”
Section: B Dynamic Analysis Of Ransomwarementioning
confidence: 99%
“…Cabaj et al [11] investigated six CryptoWall samples dynamically, focussing on the network activity, which allowed the tracking of infected proxies and the infrastructure behind the infection. This work was furthered in [12] with an expanded dataset (350 instances). In this work, multiple domain names resolved to the same IP addresses were found to be responsible for multiple C&C services Scaife et al [13] employed dynamic analysis on 492 ransomware samples from 14 families.…”
Section: B Dynamic Analysis Of Ransomwarementioning
confidence: 99%
“…Cabaj et al (2015) investigated six CryptoWall samples dynamically, focusing on the network activity, which allowed the tracking of infected proxies and the infrastructure behind the infection. This work was furthered in Cabaj et al (2016) with an expanded dataset (350 instances). In this work, multiple domain names resolved to the same IP addresses were found to be responsible for multiple C&C services.…”
Section: B Dynamic Analysis Of Ransomwarementioning
confidence: 99%
“…Of course, the Internet traffic cannot be completely denied due to the fact that modern malware, during the infection, downloads further elements from the Internet (e.g. the second stage of Locky ransomware) or contact Command and Control servers (C&C) [12]. The security researcher must determine the trade off between the risk introduced and collection of possibly valuable information when some protection mechanisms are loosen.…”
Section: Overview Of the Analytical Infrastructurementioning
confidence: 99%
“…Unfortunately, due to the great popularity of this system, these two virtual environments are the most often detected by the malware (in such case it simply stops its hostile activity). To deal with that, during our research we have developed two different environments dedicated for dynamic analysis -Maltester [13] and MESS [12].…”
Section: Overview Of the Analytical Infrastructurementioning
confidence: 99%