Show simple item record

dc.contributor.authorAli, M
dc.contributor.authorShiaeles, S
dc.contributor.authorClarke, N
dc.contributor.authorKontogeorgis, D
dc.date.accessioned2019-07-28T01:18:23Z
dc.date.issued2019-08
dc.identifier.issn2214-2126
dc.identifier.issn2214-2134
dc.identifier.urihttp://hdl.handle.net/10026.1/14705
dc.description.abstract

Digital investigators often get involved with cases, which seemingly point the responsibility to the person to which the computer belongs, but after a thorough examination malware is proven to be the cause, causing loss of precious time. Whilst Anti-Virus (AV) software can assist the investigator in identifying the presence of malware, with the increase in zero-day attacks and errors that exist in AV tools, this is something that cannot be relied upon. The aim of this paper is to investigate the behaviour of malware upon various Windows operating system versions in order to determine and correlate the relationship between malicious software and OS artifacts. This will enable an investigator to be more efficient in identifying the presence of new malware and provide a starting point for further investigation. The study analysed several versions of the Windows operating systems (Windows 7, 8.1 and 10) and monitored the interaction of 90 samples of malware (across three categories of the most prevalent (Trojan, Worm, and Bot) and 90 benign samples through the Windows Registry. Analysis of the interactions has provided a rich source of knowledge about how various forms of malware interact with key areas of the Registry. Using this knowledge, the study sought to develop an approach to predict the presence and type of malware present through an analysis of the Registry. To this end, different classifiers such as Neural Network, Random forest, Decision tree, Boosted tree and Logistic regression were tested. It was observed that Boosted tree was resulting in a correct classification of over 72% – providing the investigator with a simple approach to determining which type of malware might be present independent and faster than an Antivirus. The modelling of these findings and their integration in an application or forensic analysis within an existing tool would be useful for digital forensic investigators.

dc.format.extent139-155
dc.languageen
dc.language.isoen
dc.publisherElsevier
dc.subjectDigital forensics
dc.subjectMalware
dc.subjectMachine learning
dc.subjectRegistry hives
dc.subjectWindows Registry
dc.subjectWindows 7/8/10
dc.subjectSandbox
dc.subjectAgentless sandbox
dc.subjectCuckoo
dc.titleA proactive malicious software identification approach for digital forensic examiners
dc.typejournal-article
dc.typeArticle
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000480387600017&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.volume47
plymouth.publication-statusPublished
plymouth.journalJournal of Information Security and Applications
dc.identifier.doi10.1016/j.jisa.2019.04.013
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2019-05-16
dc.rights.embargodate2020-5-15
dc.identifier.eissn2214-2134
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1016/j.jisa.2019.04.013
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2019-08
rioxxterms.typeJournal Article/Review
plymouth.funderCyber-Trust: Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things::European Commision - H2020 RIA


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV