PL EN


2016 | 5 | 4 | 473-480
Article title

MANAGEMENT SYSTEM FOR DYNAMIC ANALYSIS OF MALICIOUS SOFTWARE

Authors
Content
Title variants
Languages of publication
EN
Abstracts
EN
In the recent years, one can observe the increase in the number of malicious software (malware) samples analyzed by the antivirus companies. One explanation is associated with attacker's antivirus systems hider tactic, which modifies hostile programs form, without changing it functionality. In effect, the first step of analysis is associated with the check if a given sample is a new threat or modification of existing. Very often such simple test can be performed automatically by dedicated information system. Paper describes information system, which allows dynamic analysis of malicious sample. Presented system was developed and deployed in the Institute of Computer Science, Warsaw University of Technology. During performed security research concerning ransomware threats system proves its usefulness. Additionally, the system become a knowledge base of known malware recently analyzed by our security team.
Year
Volume
5
Issue
4
Pages
473-480
Physical description
Dates
published
2016
Contributors
  • Institute of Computer Science, Warsaw University of Technology
References
  • McAffe Labs, Threats Report, May 2015, URL: www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2015.pdf
  • Symantec, Internet Threat Report, April 2015, URL: https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347932_GA-internet-security-threat-report-volume-20-2015-social_v2.pdf
  • Kharraz, A., Robertson W., Balzarotti, D., Bilge L.; Kirda E. (2015) Cutting the Gordian Knot: A Look Under the Hood of. Ransomware, 12th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Milan, Italy
  • Cabaj K., Gawkowski P., Grochowski K., Osojca D. (2015) Network activity analysis of CryptoWall ransomware, Przegląd Elektrotechniczny, Vol 91, No 11
  • Cabaj K., Denis M., Buda M. (2013) Management and Analytical Software for Data Gathered from HoneyPot System, Information Systems in Management, WULS Press Warsaw, vol. 2, nr 3, 182-193
  • Cabaj K., Gawkowski P. (2015) HoneyPot systems in practice, Przegląd Elektrotechniczny, Vol 91, No 2
  • Malwr.com, https://malwr.com/ (last access November 2015)
  • Reverse.It, http://www.reverse.it/ (last access November 2015)
Document Type
Publication order reference
Identifiers
ISSN
2084-5537
YADDA identifier
bwmeta1.element.desklight-6af89b80-2925-455c-acd7-7147e3e0fd6f
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.