Static and dynamic malware behavioral analysis based on arm based board
Title | Static and dynamic malware behavioral analysis based on arm based board |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Saxena, U., Bachhan, O. P., Majumdar, R. |
Conference Name | 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom) |
Date Published | mar |
Keywords | ARM based board, CCFIS sensor, CCFIS software, computer network security, Dionaea, dynamic malware behavioral analysis, Glasstopf, HoneyD, honeynet, honeypot, honeypot engineering, information system unauthorized use attempt detection, Internet, invasive software, malicious activity analysis, malicious activity detection, microprocessor chips, Network security, pubcrawl170114, security, static malware behavioral analysis, World Web application |
Abstract | A trap set to detect attempts at unauthorized use of information systems. But setting up these honeypots and keep these guzzling electricity 24X7 is rather expensive. Plus there is always a risk of a skillful hacker or a deadly malware may break through this and compromise the whole system. Honeypot name suggest, a pot that contents full of honey to allure beers, but in networks Scenario honeypot is valuable tool that helps to allure attackers. It helps to detect and analyze malicious activity over your network. However honeypots used for commercial organization do not share data and large honeypot gives read only data. We propose an Arm based device having all capability of honeypots to allure attackers. Current honeypots are based on large Network but we are trying to make s device which have the capabilities to establish in small network and cost effective. This research helps us to make a device based on arm board and CCFIS Software to allure attackers which is easy to install and cost effective. CCFIS Sensor helps us to Capture malware and Analysis the attack. In this we did reverse Engineering of honeypots to know about how it captures malware. During reverse engineering we know about pros and cons of honeypots that are mitigated in CCFIS Sensor. After Completion of device we compared honeypots and CCFIS Sensor to check the effectiveness of device. |
Citation Key | saxena_static_2015 |
- information system unauthorized use attempt detection
- World Web application
- static malware behavioral analysis
- security
- pubcrawl170114
- network security
- microprocessor chips
- malicious activity detection
- malicious activity analysis
- invasive software
- internet
- ARM based board
- honeypot engineering
- honeypot
- honeynet
- HoneyD
- Glasstopf
- dynamic malware behavioral analysis
- Dionaea
- computer network security
- CCFIS software
- CCFIS sensor