Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2016 | 5 | 4 | 473-480

Article title

MANAGEMENT SYSTEM FOR DYNAMIC ANALYSIS OF MALICIOUS SOFTWARE

Authors

Content

Title variants

Languages of publication

EN

Abstracts

EN
In the recent years, one can observe the increase in the number of malicious software (malware) samples analyzed by the antivirus companies. One explanation is associated with attacker's antivirus systems hider tactic, which modifies hostile programs form, without changing it functionality. In effect, the first step of analysis is associated with the check if a given sample is a new threat or modification of existing. Very often such simple test can be performed automatically by dedicated information system. Paper describes information system, which allows dynamic analysis of malicious sample. Presented system was developed and deployed in the Institute of Computer Science, Warsaw University of Technology. During performed security research concerning ransomware threats system proves its usefulness. Additionally, the system become a knowledge base of known malware recently analyzed by our security team.

Year

Volume

5

Issue

4

Pages

473-480

Physical description

Dates

published
2016

Contributors

  • Institute of Computer Science, Warsaw University of Technology

References

  • McAffe Labs, Threats Report, May 2015, URL: www.mcafee.com/us/resources/reports/rp-quarterly-threat-q1-2015.pdf
  • Symantec, Internet Threat Report, April 2015, URL: https://www4.symantec.com/mktginfo/whitepaper/ISTR/21347932_GA-internet-security-threat-report-volume-20-2015-social_v2.pdf
  • Kharraz, A., Robertson W., Balzarotti, D., Bilge L.; Kirda E. (2015) Cutting the Gordian Knot: A Look Under the Hood of. Ransomware, 12th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, Milan, Italy
  • Cabaj K., Gawkowski P., Grochowski K., Osojca D. (2015) Network activity analysis of CryptoWall ransomware, Przegląd Elektrotechniczny, Vol 91, No 11
  • Cabaj K., Denis M., Buda M. (2013) Management and Analytical Software for Data Gathered from HoneyPot System, Information Systems in Management, WULS Press Warsaw, vol. 2, nr 3, 182-193
  • Cabaj K., Gawkowski P. (2015) HoneyPot systems in practice, Przegląd Elektrotechniczny, Vol 91, No 2
  • Malwr.com, https://malwr.com/ (last access November 2015)
  • Reverse.It, http://www.reverse.it/ (last access November 2015)

Document Type

Publication order reference

Identifiers

ISSN
2084-5537

YADDA identifier

bwmeta1.element.desklight-6af89b80-2925-455c-acd7-7147e3e0fd6f
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.