{"title":"虚拟环境下木马防御的法医学研究","authors":"Gojko Grubor, N. Ivaniš","doi":"10.5937/SJAS1202014G","DOIUrl":null,"url":null,"abstract":"This paper presents an example of a malware attack on a virtual computer. Human factor and social engineering techniques are believed to play a major role in malware attacks. Insufficient education of the user regarding the information safety facilitates further action of the attacker. The attacker writes the malware code if necessary - as a key logger, downloader, etc. Every attack includes good preparation, port scanning, collecting infor mation about antivirus software and target computer usage, considering the scenario of the attack, and choosing the best timing and method of the attack. The paper discusses anti-forensic role of Trojans in a corrupt virtual computer from which the abuse was committed, without the owner’s knowledge. Furthermore, the paper provides more information about the experimental verification of forensic activities aimed to prove the so called “Trojan Defense” in virtual environments.","PeriodicalId":341851,"journal":{"name":"European Journal of Applied Economics","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Forensic investigation of trojan defense in virtual environment\",\"authors\":\"Gojko Grubor, N. Ivaniš\",\"doi\":\"10.5937/SJAS1202014G\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper presents an example of a malware attack on a virtual computer. Human factor and social engineering techniques are believed to play a major role in malware attacks. Insufficient education of the user regarding the information safety facilitates further action of the attacker. The attacker writes the malware code if necessary - as a key logger, downloader, etc. Every attack includes good preparation, port scanning, collecting infor mation about antivirus software and target computer usage, considering the scenario of the attack, and choosing the best timing and method of the attack. The paper discusses anti-forensic role of Trojans in a corrupt virtual computer from which the abuse was committed, without the owner’s knowledge. Furthermore, the paper provides more information about the experimental verification of forensic activities aimed to prove the so called “Trojan Defense” in virtual environments.\",\"PeriodicalId\":341851,\"journal\":{\"name\":\"European Journal of Applied Economics\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"European Journal of Applied Economics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.5937/SJAS1202014G\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Journal of Applied Economics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.5937/SJAS1202014G","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Forensic investigation of trojan defense in virtual environment
This paper presents an example of a malware attack on a virtual computer. Human factor and social engineering techniques are believed to play a major role in malware attacks. Insufficient education of the user regarding the information safety facilitates further action of the attacker. The attacker writes the malware code if necessary - as a key logger, downloader, etc. Every attack includes good preparation, port scanning, collecting infor mation about antivirus software and target computer usage, considering the scenario of the attack, and choosing the best timing and method of the attack. The paper discusses anti-forensic role of Trojans in a corrupt virtual computer from which the abuse was committed, without the owner’s knowledge. Furthermore, the paper provides more information about the experimental verification of forensic activities aimed to prove the so called “Trojan Defense” in virtual environments.