A proactive malicious software identification approach for digital forensic examiners

Ali, Muhammad; Shiaeles, Stavros; Clarke, Nathan and Kontogeorgis, Dimitrios. 2019. A proactive malicious software identification approach for digital forensic examiners. Journal of Information Security and Applications, 47, pp. 139-155. ISSN 2214-2126 [Article]

No full text available

Abstract or Description

Digital investigators often get involved with cases, which seemingly point the responsibility to the person to which the computer belongs, but after a thorough examination malware is proven to be the cause, causing loss of precious time. Whilst Anti-Virus (AV) software can assist the investigator in identifying the presence of malware, with the increase in zero-day attacks and errors that exist in AV tools, this is something that cannot be relied upon. The aim of this paper is to investigate the behaviour of malware upon various Windows operating system versions in order to determine and correlate the relationship between malicious software and OS artifacts. This will enable an investigator to be more efficient in identifying the presence of new malware and provide a starting point for further investigation.

The study analysed several versions of the Windows operating systems (Windows 7, 8.1 and 10) and monitored the interaction of 90 samples of malware (across three categories of the most prevalent (Trojan, Worm, and Bot) and 90 benign samples through the Windows Registry. Analysis of the interactions has provided a rich source of knowledge about how various forms of malware interact with key areas of the Registry. Using this knowledge, the study sought to develop an approach to predict the presence and type of malware present through an analysis of the Registry. To this end, different classifiers such as Neural Network, Random forest, Decision tree, Boosted tree and Logistic regression were tested. It was observed that Boosted tree was resulting in a correct classification of over 72% – providing the investigator with a simple approach to determining which type of malware might be present independent and faster than an Antivirus. The modelling of these findings and their integration in an application or forensic analysis within an existing tool would be useful for digital forensic investigators.

Item Type:

Article

Identification Number (DOI):

https://doi.org/10.1016/j.jisa.2019.04.013

Keywords:

Digital forensics, Malware, Machine learning, Registry hives, Windows Registry, Windows 7/8/10, Sandbox, Agentless sandbox, Cuckoo

Departments, Centres and Research Units:

Computing

Dates:

DateEvent
16 May 2019Published Online
August 2019Published

Item ID:

28238

Date Deposited:

03 Mar 2020 16:45

Last Modified:

04 Mar 2020 15:54

Peer Reviewed:

Yes, this version has been peer-reviewed.

URI:

https://research.gold.ac.uk/id/eprint/28238

Edit Record Edit Record (login required)