Visible to the public Static and dynamic malware behavioral analysis based on arm based board

TitleStatic and dynamic malware behavioral analysis based on arm based board
Publication TypeConference Paper
Year of Publication2015
AuthorsSaxena, U., Bachhan, O. P., Majumdar, R.
Conference Name2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom)
Date Publishedmar
KeywordsARM based board, CCFIS sensor, CCFIS software, computer network security, Dionaea, dynamic malware behavioral analysis, Glasstopf, HoneyD, honeynet, honeypot, honeypot engineering, information system unauthorized use attempt detection, Internet, invasive software, malicious activity analysis, malicious activity detection, microprocessor chips, Network security, pubcrawl170114, security, static malware behavioral analysis, World Web application
Abstract

A trap set to detect attempts at unauthorized use of information systems. But setting up these honeypots and keep these guzzling electricity 24X7 is rather expensive. Plus there is always a risk of a skillful hacker or a deadly malware may break through this and compromise the whole system. Honeypot name suggest, a pot that contents full of honey to allure beers, but in networks Scenario honeypot is valuable tool that helps to allure attackers. It helps to detect and analyze malicious activity over your network. However honeypots used for commercial organization do not share data and large honeypot gives read only data. We propose an Arm based device having all capability of honeypots to allure attackers. Current honeypots are based on large Network but we are trying to make s device which have the capabilities to establish in small network and cost effective. This research helps us to make a device based on arm board and CCFIS Software to allure attackers which is easy to install and cost effective. CCFIS Sensor helps us to Capture malware and Analysis the attack. In this we did reverse Engineering of honeypots to know about how it captures malware. During reverse engineering we know about pros and cons of honeypots that are mitigated in CCFIS Sensor. After Completion of device we compared honeypots and CCFIS Sensor to check the effectiveness of device.

Citation Keysaxena_static_2015