Visible to the public An Experimental Analysis of Windows Log Events Triggered by Malware

TitleAn Experimental Analysis of Windows Log Events Triggered by Malware
Publication TypeConference Paper
Year of Publication2017
AuthorsSainju, Arpan Man, Atkison, Travis
Conference NameProceedings of the SouthEast Conference
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5024-2
Keywordscomposability, digital forensics, Metrics, pubcrawl, Resiliency, security, survey, Windows Log Events, Windows operating system, windows operating systems security
Abstract

According to the 2016 Internet Security Threat Report by Symantec, there are around 431 million variants of malware known. This effort focuses on malware used for spying on user's activities, remotely controlling devices, and identity and credential theft within a Windows based operating system. As Windows operating systems create and maintain a log of all events that are encountered, various malware are tested on virtual machines to determine what events they trigger in the Windows logs. The observations are compiled into Operating System specific lookup tables that can then be used to find the tested malware on other computers with the same Operating System.

URLhttp://doi.acm.org/10.1145/3077286.3077295
DOI10.1145/3077286.3077295
Citation Keysainju_experimental_2017