Publication | Closed Access
Behavioral analysis of malicious code through network traffic and system call monitoring
21
Citations
12
References
2011
Year
Internet Traffic AnalysisEngineeringEvasion TechniqueInformation SecuritySystem Call MonitoringSoftware EngineeringInformation ForensicsMalicious CodeSoftware AnalysisNetwork TrafficMalware BehaviorThreat DetectionComputer ScienceBehavioral AnalysisProgram AnalysisSoftware TestingAnti-virus TechniqueBotnet DetectionMalware SamplesMalware Analysis
Malicious code (malware) that spreads through the Internet-such as viruses, worms and trojans-is a major threat to information security nowadays and a profitable business for criminals. There are several approaches to analyze malware by monitoring its actions while it is running in a controlled environment, which helps to identify malicious behaviors. In this article we propose a tool to analyze malware behavior in a non-intrusive and effective way, extending the analysis possibilities to cover malware samples that bypass current approaches and also fixes some issues with these approaches.
| Year | Citations | |
|---|---|---|
Page 1
Page 1