Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform

被引:0
作者
Elmisery, Ahmed M. [1 ]
Sertovic, Mirela [2 ]
Qasem, Mamoun [1 ]
机构
[1] Univ South Wales, Fac Comp Engn & Sci, Pontypridd, M Glam, Wales
[2] Concept Tech Int Ltd, Threat Def Unit, Belfast, Antrim, North Ireland
来源
SERVICE-ORIENTED COMPUTING, ICSOC 2020 | 2021年 / 12632卷
关键词
Malicious binaries; Malware; Threat hunting; Digital investigations;
D O I
10.1007/978-3-030-76352-7_54
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The rising cyber threat puts organizations and ordinary users at risk of data breaches. In many cases, Early detection can hinder the occurrence of these incidents or even prevent a full compromise of all internal systems. The existing security controls such as firewalls and intrusion prevention systems are constantly blocking numerous intrusions attempts that happen on a daily basis. However, new situations may arise where these security controls are not sufficient to provide full protection. There is a necessity to establish a threat hunting methodology that can assist investigators and members of the incident response team to analyse malicious binaries quickly and efficiently. The methodology proposed in this research is able to distinguish malicious binaries from benign binaries using a quick and efficient way. The proposed methodology consists of static and dynamic hunting techniques. Using these hunting techniques, the proposed methodology is not only capable of identifying a range of signature-based anomalies but also to pinpoint behavioural anomalies that arise in the operating system when malicious binaries are triggered. Static hunting can describe any extracted artifacts as malicious depending on a set of pre-defined patterns of malicious software. Dynamic hunting can assist investigators in finding behavioural anomalies. This work focuses on applying the proposed threat hunting methodology on samples of malicious binaries, which can be found in common malware repositories and presenting the results.
引用
收藏
页码:627 / 641
页数:15
相关论文
共 24 条
  • [1] Akbanov V.G., STATIC DYNAMIC ANAL
  • [2] Aman Waqas, 2014, INT J NETW SECUR ITS, V6, P63
  • [3] [Anonymous], 2011, J CONVERG
  • [4] A Survey on Detection Techniques for Cryptographic Ransomware
    Berrueta, Eduardo
    Morato, Daniel
    Magana, Eduardo
    Izal, Mikel
    [J]. IEEE ACCESS, 2019, 7 : 144925 - 144944
  • [5] Data mining-based integrated network traffic visualization framework for threat detection
    Bhardwaj, Amit Kumar
    Singh, Maninder
    [J]. NEURAL COMPUTING & APPLICATIONS, 2015, 26 (01) : 117 - 130
  • [6] Towards a Framework to Detect Multi-Stage Advanced Persistent Threats Attacks
    Bhatt, Parth
    Yano, Edgar Toshiro
    Gustavsson, Per M.
    [J]. 2014 IEEE 8TH INTERNATIONAL SYMPOSIUM ON SERVICE ORIENTED SYSTEM ENGINEERING (SOSE), 2014, : 390 - 395
  • [7] The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures
    Connolly, Lena Y.
    Wall, David S.
    [J]. COMPUTERS & SECURITY, 2019, 87
  • [8] Dowdy J, 2012, CYBERSPACE NEW DOMAI
  • [9] Elmisery A.M., 2012, COMPUTER SCI ITS APP, V203, P313
  • [10] Privacy Preserving Threat Hunting in Smart Home Environments
    Elmisery, Ahmed M.
    Sertovic, Mirela
    [J]. ADVANCES IN CYBER SECURITY (ACES 2019), 2020, 1132 : 104 - 120