Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs

Yiheng Duan, Xiao Fu, Bin Luo, Ziqi Wang, Jin Shi, Xiaojiang Du

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

35 Scopus citations

Abstract

Current memory forensic methods mainly focus on evidence collection and data recovery. A little work is about how to automatically identify malwares from many unknown processes and analyze their behaviors in high semantic level so as to collect related evidences. In fact, in real cases, investigators are often faced with large number of processes that they have no knowledge of. Although current malware detection tools could provide some help, they usually can't illustrate the purposes, abilities and behavior details of malwares and are thus often not fit for the forensic requirements. In this paper, we present a framework named Detective to cope with these issues. Given a set of unknown processes, Detective can classify benign and malware processes automatically. This is implemented by HNB classifying algorithm and a Dynamic-Link Libraries-based model. Detective could then explain malware behaviors in high semantic level through clustering and frequent item sets mining techniques. Besides, Detective sheds light on evidence collection by the information obtained from previous steps. Detective is applicable for both online and offline forensic scenarios. Experiments on real-world malware set have proved that the accuracy of Detective is above 90% and the time cost is only several seconds.

Original languageEnglish
Title of host publication2015 IEEE International Conference on Communications, ICC 2015
Pages5691-5696
Number of pages6
ISBN (Electronic)9781467364324
DOIs
StatePublished - 9 Sep 2015
EventIEEE International Conference on Communications, ICC 2015 - London, United Kingdom
Duration: 8 Jun 201512 Jun 2015

Publication series

NameIEEE International Conference on Communications
Volume2015-September
ISSN (Print)1550-3607

Conference

ConferenceIEEE International Conference on Communications, ICC 2015
Country/TerritoryUnited Kingdom
CityLondon
Period8/06/1512/06/15

Keywords

  • DLL
  • data mining
  • malware processes
  • memory forensics

Fingerprint

Dive into the research topics of 'Detective: Automatically identify and analyze malware processes in forensic scenarios via DLLs'. Together they form a unique fingerprint.

Cite this