一种使用内存取证的有效威胁搜索方法

D. Javeed, M. Khan, Ijaz Ahmad, Tahir Iqbal, Umar Mohammed Badamasi, C. Ndubuisi, Aliyu Umar
{"title":"一种使用内存取证的有效威胁搜索方法","authors":"D. Javeed, M. Khan, Ijaz Ahmad, Tahir Iqbal, Umar Mohammed Badamasi, C. Ndubuisi, Aliyu Umar","doi":"10.47277/ijcncs/8(5)1","DOIUrl":null,"url":null,"abstract":"The capacity and occurrence of new cyber-attacks have shattered in recent years. Such measures have very complicated workflows and comprise multiple illegal actors and organizations. Threat hunting demonstrates the process of proactively searching through networks for threats based on zero-day attacks by repeating the hunting process again and again. Unlike threat intelligence, it uses different automated security tools to collect logs in order to provide a pattern for making new intelligence-based tools by following those logs. According to our research findings about “threat hunting tools” there’s a major flaw that the designed tools are limited to the collection of logs. It works completely on logs for generating new patterns avoiding system’s main memory. Codes written directly to memory fail this process to provide proactive hunting. To overcome this major challenge, we are proposing two distinct methods, either by generating malicious code alerts or by binding memory forensics processes with threat hunting tools to make active hunting possible","PeriodicalId":265348,"journal":{"name":"International Journal of Computer Networks and Communications Security","volume":"94 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"An Efficient Approach of Threat Hunting Using Memory Forensics\",\"authors\":\"D. Javeed, M. Khan, Ijaz Ahmad, Tahir Iqbal, Umar Mohammed Badamasi, C. Ndubuisi, Aliyu Umar\",\"doi\":\"10.47277/ijcncs/8(5)1\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The capacity and occurrence of new cyber-attacks have shattered in recent years. Such measures have very complicated workflows and comprise multiple illegal actors and organizations. Threat hunting demonstrates the process of proactively searching through networks for threats based on zero-day attacks by repeating the hunting process again and again. Unlike threat intelligence, it uses different automated security tools to collect logs in order to provide a pattern for making new intelligence-based tools by following those logs. According to our research findings about “threat hunting tools” there’s a major flaw that the designed tools are limited to the collection of logs. It works completely on logs for generating new patterns avoiding system’s main memory. Codes written directly to memory fail this process to provide proactive hunting. To overcome this major challenge, we are proposing two distinct methods, either by generating malicious code alerts or by binding memory forensics processes with threat hunting tools to make active hunting possible\",\"PeriodicalId\":265348,\"journal\":{\"name\":\"International Journal of Computer Networks and Communications Security\",\"volume\":\"94 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-05-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computer Networks and Communications Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.47277/ijcncs/8(5)1\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computer Networks and Communications Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.47277/ijcncs/8(5)1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

近年来,新型网络攻击的能力和发生都在急剧增加。此类措施的工作流程非常复杂,并包含多个非法行为者和组织。威胁搜索是指通过不断重复的搜索过程,在网络中主动搜索基于零日攻击的威胁。与威胁情报不同,它使用不同的自动化安全工具来收集日志,以便通过跟踪这些日志为创建新的基于智能的工具提供模式。根据我们对“威胁狩猎工具”的研究发现,设计的工具存在一个主要缺陷,即仅限于收集日志。它完全在日志上工作,以生成新的模式,避免了系统的主内存。直接写入内存的代码无法提供主动搜索。为了克服这一重大挑战,我们提出了两种不同的方法,一种是生成恶意代码警报,另一种是将内存取证过程与威胁搜索工具绑定,从而使主动搜索成为可能
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An Efficient Approach of Threat Hunting Using Memory Forensics
The capacity and occurrence of new cyber-attacks have shattered in recent years. Such measures have very complicated workflows and comprise multiple illegal actors and organizations. Threat hunting demonstrates the process of proactively searching through networks for threats based on zero-day attacks by repeating the hunting process again and again. Unlike threat intelligence, it uses different automated security tools to collect logs in order to provide a pattern for making new intelligence-based tools by following those logs. According to our research findings about “threat hunting tools” there’s a major flaw that the designed tools are limited to the collection of logs. It works completely on logs for generating new patterns avoiding system’s main memory. Codes written directly to memory fail this process to provide proactive hunting. To overcome this major challenge, we are proposing two distinct methods, either by generating malicious code alerts or by binding memory forensics processes with threat hunting tools to make active hunting possible
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信