
Number of Journals | 34 |
Number of Issues | 1,306 |
Number of Articles | 9,428 |
Article View | 9,191,877 |
PDF Download | 5,622,547 |
A Secure Environment for Behavioral Malware Analysis | ||
پدافند الکترونیکی و سایبری | ||
Article 6, Volume 2, Issue 3, February 2020, Pages 65-76 PDF (1 M) | ||
Authors | ||
Danial Javaheri* 1; Saeed Parsa2 | ||
1Master's degree, Borujerd Islamic Azad University | ||
2Associate Professor, Iran University of Science and Technology | ||
Receive Date: 09 June 2014, Revise Date: 04 July 2023, Accept Date: 19 September 2018 | ||
Abstract | ||
In this article we propose a file analyzer based on sandbox in the client side. This analyzer environment is used for safe execution of a suspicious application to find its behavior and determine if it is safe or not. This sandbox can also be used for behavioral modeling of a malware by in hand execution for understanding distractive and infecting pattern of malwares for creating disinfection and a cleaner method. The advantages of proposed method is in reducing problems with malware detection specifically in detection of obfuscated and metamorphic malwares that can’t be detected by signature and static base analysis methods. So this contains the main goal of this article for providing platform of dynamic analysis. Proposed sandbox can monitor and track incoming requests of an application in both user and kernel mode of operating system. This article clusters incoming requests in 8 families with performing data mining on 21000 samples of malwares and benign files and replying them with 5 policies y including logging, redirection, rejecting, cheating and emulating of system resources. Our sandbox guarantees health of operation system during execution and analysis of malwares. In addition this article discusses challenges on dynamic analysis and analyzer environment and gives solutions for them. Most of the challenges focus on methods of detecting and bypassing analyzer environments. At last, this article evaluates the proposed sandbox based on the potentiality and capabilities of behavioral tracking and usage of system resources and compares it with some top famous analyzers in the word. | ||
Keywords | ||
Analyzer Environment; Sandbox; Malware Analysis; Software Verification; System Call Tracking; Hooking | ||
References | ||
[1] Javaheri, D.; ―Design and Implementation a Secure and | ||
Statistics Article View: 397 PDF Download: 265 |