Assignment 1 - Copy
Assignment 1 - Copy
Assignment number and title: Assignment 1 Reseach Project Due date: 10/15/23
Nguyen
Family name: Identity no: 103488036
Viet Trung
Other names:
Marker's
Total comments:
Mark:
Extension certification:
This assignment has been given an extension and is now due on: October 15th 2023
Signature of Convener: Date: / 2023
Abstract
The term malware refers to all kinds of harmful computer programs, including viruses,
worms, trojans, and other malware. Malicious objects have been trying to sneak into
security holes in devices and systems as the Internet gradually becomes an essential part
of our daily lives.
Rather than being identified as malicious software based on its construction, software is
categorized as malicious based on its intended use. In most cases, they are not large,
complex, or capable of stealing basic data or impairing the device's performance, putting
the user at risk.
Introduction
Designed to harm devices and users, malware steals data and adversely affects
performance. Currently, most malware is targeted at devices and applications that are
connected to the internet. Due to the fact that the Internet today is a part of our work and
lives, it is critical to track and stop these malicious software as soon as possible, in order
to prevent long-term harm and risk to the users. It is probably the type of malware that
spreads to other devices that is most dangerous today, for they wreak havoc on a wide
number of devices, affecting a large number of users, sometimes at the same time.
Moreover, these are also the hardest to prevent, since they are like a disease, where as
long as there is an 'infected' device, the malicious virus remains. With malware developers
increasingly making them harder to detect and penetrate more sophisticated devices,
prevention is becoming more and more challenging.
Antivirus software has become increasingly popular as a way to protect users' devices and
servers. Their purpose is to track and prevent malicious software from being installed on
the system, as well as to destroy it. In the future, everything will continue to evolve,
including malware. By gaining access to antivirus software, malware creators will
penetrate and learn how these applications work, find their loopholes, and develop new
malware that bypasses firewall protections of these programs. As a result of rapid
developments in systems science, computer software for security is improving, and tracing
techniques and machine learning are increasingly being incorporated, which provides
greater accuracy and more efficient tracking of malware.
The purpose of this paper is to summarize a few types of malware, the evolution of
malware disguises, and techniques for detecting and analyzing malware.
Background
Creeper was an experimental piece of software created by Bob Thomas at BBN in 1971.
Its initial version was intended to travel between DEC PDP-10 mainframe computers
running the TENEX operating system over the ARPANET. An updated version was
created by Ray Tomlinson to duplicate itself across computers instead of only moving
between DEC PDP-10 mainframe computers. Creeper is widely recognized as the first
computer worm since it is self-replicating. In Creeper, software that was capable of
replicating itself and spreading to other computers was tested.
"I'M THE CREEPER. CATCH ME IF YOU CAN." was the only message the program
produced to the teletype reader, proving that it wasn't actively hostile software because
there was no corruption of the data.
It is also important to note that malware has taken on many forms over the years, in order
to obtain as much information as possible from a user, as is shown in the image below.
APT malware has infected 180,000 computers in Vietnamese agencies and organizations
in the past year, according to Bkav data. It is still primarily distributed via email with
content that encourages or entices the reader to open attachments. Once the user opens
the file, the malicious code is activated, making the computer silently operate: installing
other components for remote control, stealing data, escalating privileges, etc. In order to
keep attacking organizations and agencies, we need equipment to penetrate deeper into
their systems...
Malware Analysis
Understanding the behavior and function of suspicious files and links is vital to the
analysis of malware. The practice of identifying and analyzing suspicious files on
endpoints and within networks is called malware analysis. It can be either dynamic, static,
or full reverse engineering.
Main Objectives:
Destroying the malware: As part of malware analysis, people are made aware of
malware and cyberthreats by demystifying them. Malware, in reality, is nothing
more than a software program that is specifically designed to harm. In order to
prevent malware from infiltrating your ecosystem or at least from spreading, it is
essential to understand the code and how it works.
Learning its characteristics and features: The digital footprint left by malware is
unique, as it is with every piece of software. What treatment does a particular strain
of malware give to data in its particular variant or family? What are the ways it
spreads? How quickly does it reproduce and how does it conceal itself? Knowing
the exact characteristics of malware makes it easier to detect it.
Aggregating the data to predict the impact: A probable impact profile can be
produced by combining the surveys above. In terms of malware impacts, its
effectiveness, its target systems, and its speed of development and distribution are
all factors. By doing so, companies can plan and implement mitigation procedures.
Technical signs arise when malware is executed and offer a detection signature
that dynamic analysis can recognize. The sandbox system is monitored by dynamic
analysis tools to observe how the virus changes it. New registry keys, IP
addresses, domain names, and file path locations are examples of modifications.
Dynamic analysis will also show whether the infection is contacting an outside
server used by the hacker. Another beneficial dynamic analysis tool is debugging.
A debugger may focus on each action of the program's behavior when the
instructions are being processed while the malware is operating.
Malware Detection
The malware that serves criminal ends is aggressive and may cause interference,
disruption, and other negative effects on computers. Malware detection, however, refers to
a set of defensive strategies and tools that help detect, stop, and counteract malware's
negative effects. Depending on the type of malware that infected the system, this
preventive approach consists of many different methods amplified by an array of
instruments.
1. Signature-Based Detection
Reams of data will be combed and thoroughly examined by the malware analyst for
any unusual activity or behavior. By employing this technique, the analyst is
responsible for looking for malicious code that exhibits suspicious behavior.
Heuristic-based detection enables detection and response to any known and new
malware assaults. The foundation of heuristic-based detection consists of two
parts. The system's behavior is initially monitored without being attacked, and vital
data is recorded. The second monitors this distinction to identify malware specific to
a certain family.
LITERATURE REVIEW
Modern computer security has significantly improved over the years, but it remains
challenging to keep systems safe from malware. Malware damages a computer system
and infects nearby devices, causing errors as well as damage. These malicious programs
affect the system, disrupt data and information, and steal information and data. The latest
types of malware are less detectable and more concealable than traditional ones. As
opposed to the traditional style, which goes under the radar, today's types are installed
and executed surreptitiously and attack directly at the target that has been targeted by the
bad actors, generating several variables in the process, a new body, accompanied by
many different concealment techniques.
1. Signature based detection
Using S-based detection, genetic algorithms (GA), and signature generators,
Zolkipli and Jantan proposed a sophisticated malware detection system. The
bioinformatics technique proposed by Tang et al., allows for the generation of
accurate exploits for polymorphic worms based on exploit-based signatures. An
alignment and clustering system based on sequence clustering and alignment was
proposed by Borojerdi and Abadi. Only hundreds of malware specimens have been
tested using the proposed method, which is limited to polymorphic malware. In
those tests, they achieved an FPR of 0.80% by selecting 0.4 cluster radius and
0.05 similarity threshold. Compared with state-of-the-art methods for signature
generation, the proposed system performed better.
DISCUSSION
As a result of our discussion, we identified two primary methods used to analyze malware.
It is further difficult to identify malware because it uses many camouflage strategies. The
writer responds to new methods of analysis by developing new counter analyses,
detections, analyses, and finally countermeasures. It is not possible to identify every new
generation of sophisticated malware, even after the publication of multiple new methods
based on these diverse malware detection approaches. Despite having high FPRs,
signature- and heuristic-based detection techniques are effective in finding known
malware. Furthermore, it appears that a number of known and ongoing assaults have
been recognized by deep learning-based technologies, mobile devices, and the Internet.
However, using these techniques won't be able to stop all assaults. A reliable method for
identifying malware is difficult to build, hence there is a pressing need for new research
methodologies.
CONCLUSION
Static analysis examines malware files without launching the program. Because running
the code might infect your machine, this malware analysis method is the most secure. The
most basic form of static analysis gathers information about malware without even looking
at the code. Information contained in metadata such as the file name, type, and size can
be helpful in identifying the malware's characteristics. A database can be searched to
detect viruses previously seen on the basis of checksums and hashes generated with
MD5. You may also be able to tell what type of infection you have from antivirus software
scanning.
Binary files can be disassembled using advanced static analysis so that each component
can be examined without the binary files being executed. Hackers may trick
disassemblers into continuing to run malicious code by reverse engineering the code with
a disassembler. Malware must also be analyzed dynamically.
References
1) Evolution of Malware Threats and Techniques: A Review:
https://www.proquest.com/openview/9cba498838c4c7e7eb8a69a27b9ab042/1?pq-
origsite=gscholar&cbl=52057
Access: September 28th 2023
2) An ninh mạng 2022 tại Việt Nam vẫn còn những điểm đáng quan ngại:
https://www.qdnd.vn/giao-duc-khoa-hoc/cac-van-de/an-ninh-mang-2022-tai-viet-nam-van-
con-nhung-diem-dang-quan-ngai-713907
Access: September 28th 2023