2 June 2011 Visualization techniques for malware behavior analysis
Author Affiliations +
Abstract
Malware spread via Internet is a great security threat, so studying their behavior is important to identify and classify them. Using SSDT hooking we can obtain malware behavior by running it in a controlled environment and capturing interactions with the target operating system regarding file, process, registry, network and mutex activities. This generates a chain of events that can be used to compare them with other known malware. In this paper we present a simple approach to convert malware behavior into activity graphs and show some visualization techniques that can be used to analyze malware behavior, individually or grouped.
© (2011) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
André R. A. Grégio, André R. A. Grégio, Rafael D. C. Santos, Rafael D. C. Santos, "Visualization techniques for malware behavior analysis", Proc. SPIE 8019, Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense X, 801905 (2 June 2011); doi: 10.1117/12.883441; https://doi.org/10.1117/12.883441
PROCEEDINGS
9 PAGES


SHARE
RELATED CONTENT


Back to Top