利用机器学习算法检测恶意软件的法医易失性存储器

Fikri Bahtiar, N. Widiyasono, A. P. Aldya
{"title":"利用机器学习算法检测恶意软件的法医易失性存储器","authors":"Fikri Bahtiar, N. Widiyasono, A. P. Aldya","doi":"10.25124/jrsi.v5i02.311","DOIUrl":null,"url":null,"abstract":"Forensics from volatile memory plays an important role in the investigation of cyber crime. The acquisition of RAM Memory or other terms of RAM dump can assist forensic investigators in retrieving much of the information related to crime. There are various tools available for RAM analysis including Volatility, which currently dominates open source forensic RAM tools. It has happened that many forensic investigators are thinking that they probably have malware in the RAM dump. And, if they do exist, they're still not very capable Malware Analysts, so it's hard for them to analyze the possibilities of malware in a RAM dump. The availability of tools such as Volatility allows forensic investigators to identify and link the various components to conclude whether the crime was committed using malware or not. However, the use of volatility requires knowledge of basic commands as well as static malware analysis. This work is done to assist forensic investigators in detecting and analyzing possible malware from dump RAM. This work is based on the volatility framework and the result is a Forensic tool for analyzing RAM dumps and detecting possible malware in it using machine learning algorithms in order to detect offline (not connected to the internet).","PeriodicalId":306088,"journal":{"name":"Jurnal Rekayasa Sistem & Industri (JRSI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Forensic Volatile Memory For Malware Detection Using Machine Learning Algorithm\",\"authors\":\"Fikri Bahtiar, N. Widiyasono, A. P. Aldya\",\"doi\":\"10.25124/jrsi.v5i02.311\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Forensics from volatile memory plays an important role in the investigation of cyber crime. The acquisition of RAM Memory or other terms of RAM dump can assist forensic investigators in retrieving much of the information related to crime. There are various tools available for RAM analysis including Volatility, which currently dominates open source forensic RAM tools. It has happened that many forensic investigators are thinking that they probably have malware in the RAM dump. And, if they do exist, they're still not very capable Malware Analysts, so it's hard for them to analyze the possibilities of malware in a RAM dump. The availability of tools such as Volatility allows forensic investigators to identify and link the various components to conclude whether the crime was committed using malware or not. However, the use of volatility requires knowledge of basic commands as well as static malware analysis. This work is done to assist forensic investigators in detecting and analyzing possible malware from dump RAM. This work is based on the volatility framework and the result is a Forensic tool for analyzing RAM dumps and detecting possible malware in it using machine learning algorithms in order to detect offline (not connected to the internet).\",\"PeriodicalId\":306088,\"journal\":{\"name\":\"Jurnal Rekayasa Sistem & Industri (JRSI)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Jurnal Rekayasa Sistem & Industri (JRSI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.25124/jrsi.v5i02.311\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jurnal Rekayasa Sistem & Industri (JRSI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25124/jrsi.v5i02.311","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

易失性存储器取证在网络犯罪调查中发挥着重要作用。获取RAM内存或RAM转储的其他术语可以帮助法医调查人员检索与犯罪有关的许多信息。有各种各样的工具可用于RAM分析,包括波动性,它目前在开源取证RAM工具中占主导地位。许多法医调查人员认为他们可能在RAM转储中有恶意软件。而且,如果他们确实存在,他们仍然不是很有能力的恶意软件分析师,所以他们很难分析RAM转储中恶意软件的可能性。波动性等工具的可用性使法医调查人员能够识别和链接各种组件,从而得出犯罪是否使用恶意软件的结论。然而,波动性的使用需要基本命令的知识以及静态恶意软件分析。这项工作是为了协助法医调查人员检测和分析可能的恶意软件从转储RAM。这项工作是基于波动性框架的,结果是一个取证工具,用于分析RAM转储并使用机器学习算法检测其中可能的恶意软件,以便检测离线(未连接到互联网)。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Forensic Volatile Memory For Malware Detection Using Machine Learning Algorithm
Forensics from volatile memory plays an important role in the investigation of cyber crime. The acquisition of RAM Memory or other terms of RAM dump can assist forensic investigators in retrieving much of the information related to crime. There are various tools available for RAM analysis including Volatility, which currently dominates open source forensic RAM tools. It has happened that many forensic investigators are thinking that they probably have malware in the RAM dump. And, if they do exist, they're still not very capable Malware Analysts, so it's hard for them to analyze the possibilities of malware in a RAM dump. The availability of tools such as Volatility allows forensic investigators to identify and link the various components to conclude whether the crime was committed using malware or not. However, the use of volatility requires knowledge of basic commands as well as static malware analysis. This work is done to assist forensic investigators in detecting and analyzing possible malware from dump RAM. This work is based on the volatility framework and the result is a Forensic tool for analyzing RAM dumps and detecting possible malware in it using machine learning algorithms in order to detect offline (not connected to the internet).
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信