Show simple item record

dc.contributor.authorAli, M
dc.contributor.authorShiaeles, S
dc.contributor.authorPapadaki, M
dc.contributor.authorGhita, BV
dc.date.accessioned2019-07-28T01:06:43Z
dc.date.available2019-07-28T01:06:43Z
dc.date.issued2018-10
dc.identifier.isbn9781538672723
dc.identifier.issn2150-329X
dc.identifier.urihttp://hdl.handle.net/10026.1/14703
dc.description2018 Global Information Infrastructure and Networking Symposium (GIIS)
dc.description.abstract

Malicious software is detected and classified by either static analysis or dynamic analysis. In static analysis, malware samples are reverse engineered and analyzed so that signatures of malware can be constructed. These techniques can be easily thwarted through polymorphic, metamorphic malware, obfuscation and packing techniques, whereas in dynamic analysis malware samples are executed in a controlled environment using the sandboxing technique, in order to model the behavior of malware. In this paper, we have analyzed Petya, Spyeye, VolatileCedar, PAFISH etc. through Agent-based and Agentless dynamic sandbox systems in order to investigate and benchmark their efficiency in advanced malware detection.

dc.format.extent1-5
dc.language.isoen
dc.publisherIEEE
dc.subjectMalware detection
dc.subjectStatic analysis
dc.subjectDynamic analysis
dc.subjectCuckoo
dc.subjectVMRay
dc.titleAgent-based Vs Agent-less Sandbox for Dynamic Behavioral Analysis
dc.typeconference
dc.typeProceedings Paper
plymouth.author-urlhttp://arxiv.org/abs/1904.02100v1
plymouth.date-start2018-10-23
plymouth.date-finish2018-10-25
plymouth.volume00
plymouth.publisher-urlhttp://dx.doi.org/10.1109/GIIS.2018.8635598
plymouth.conference-name2018 Global Information Infrastructure and Networking Symposium (GIIS)
plymouth.publication-statusPublished
plymouth.journal2018 Global Information Infrastructure and Networking Symposium (GIIS)
dc.identifier.doi10.1109/giis.2018.8635598
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2018-01-01
dc.rights.embargodate2024-1-4
rioxxterms.versionofrecord10.1109/giis.2018.8635598
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeConference Paper/Proceeding/Abstract


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV