ICS - Unit 5
ICS - Unit 5
o Key techniques include analyzing running processes, network connections, and memory-
resident malware.
3. Memory Artifacts: Includes running processes, loaded modules, active network sockets,
injected code, and more.
Memory Forensics:
Memory forensics is a critical aspect of cybersecurity focused on analyzing
a computer's volatile memory (RAM) to uncover evidence of malicious activity, investigate incidents,
and enhance threat detection. Unlike traditional disk forensics, which deals with static data on storage
devices, memory forensics focuses on live system data, which is transient and dynamic.
Key Concepts in Memory Forensics
1. Volatile Memory: RAM is volatile, meaning its contents are lost when a system is powered
down. It contains real-time information such as running processes, network connections, loaded
drivers, and encryption keys.
2. Malware Analysis:
o Understanding malicious payloads and behavior without requiring disk artifacts.
3. Threat Hunting:
o Detecting anomalies and fileless malware through behavioral analysis.
4. Digital Forensics:
o Enhancing evidence collection for legal or investigative purposes.
What is HONEYPOT?
A Honeypot is a network-attached system used as a trap for cyber-attackers to detect and study the
tricks and types of attacks used by hackers. It acts as a potential target on the internet and informs
the defenders about any unauthorized attempt at the information system. Honeypots are mostly used
by large companies and organizations involved in cybersecurity.
ADVANTAGES of Honeypot:
Acts as a rich source of information and helps collect real-time data. Identifies malicious activity even
if encryption is used. Wastes hackers’ time and resources. Improves security.
DISADVANTAGES:
Being distinguishable from production systems, it can be easily identified by experienced attackers.
Intrusion Detection Systems 3
IDS
Having a narrow field of view, it can only identify direct attacks.
A honeypot once attacked can be used to attack other systems.
Fingerprinting(an attacker can identify the true identity of a honeypot ).
Based on their deployment, Honeypots are divided into
Research honeypots: These are used by researchers to analyze hacker attacks and deploy different
ways to prevent these attacks.
Production honeypots: Production honeypots are deployed in production networks along with the
server. These honeypots act as a frontend trap for the attackers, consisting of false information and
giving time to the administrators to improve any vulnerability in the actual system.
Automated malicious code analysis system
1. Introduction
Definition: A system designed to automatically identify, analyze, and mitigate malicious code or software.
Purpose: To safeguard systems against cyber threats by detecting malware, viruses, trojans, ransomware, and
other harmful code.
2. Importance
Rising Threats: With the increasing complexity and frequency of cyberattacks, manual analysis is no longer
sufficient.
Speed and Scalability: Automating the process reduces analysis time and enables handling of large volumes of
data.
Accuracy: Minimizes human error, ensuring consistent detection and analysis.
Proactive Defense: Helps in identifying new (zero-day) threats before they cause damage.
3. Key Components
1. Data Collection:
Sources: Network traffic, emails, file uploads, websites, and logs.
Tools: Packet sniffers, log analyzers, and file scanners.
2. Static Analysis:
Examines code without execution.
Techniques:
Disassembly: Converts binary code into a human-readable format.
String Analysis: Searches for suspicious patterns like URLs or IPs.
Signature Matching: Compares against known malware signatures.
3. Dynamic Analysis:
Observes behavior by executing code in a controlled environment.
Techniques:
Sandboxing: Isolates code execution to monitor its behavior safely.
API Monitoring: Tracks calls made by the program to system resources.
4. Machine Learning:
Trains models to detect anomalies and classify benign/malicious code.
Examples:
Clustering similar behaviors.
Predicting new threats using supervised/unsupervised learning.
5. Visualization and Reporting:
Presents findings in an understandable format.
Dashboards and alerts for administrators.
Intrusion Detection Systems 4
IDS
4. Challenges:
Evasion Techniques: Malware authors use obfuscation, encryption, and polymorphism to evade detection.
False Positives/Negatives: Balancing precision and recall is difficult.
Resource Intensity: Dynamic analysis requires significant computational power.
Continuous Updates: Systems need regular updates to keep up with new malware techniques.
5. Applications
Enterprise Security: Protects company data and systems.
Government Defense: Detects nation-state cyber threats.
Cloud Security: Monitors and defends cloud infrastructure.
Individual Users: Tools like antivirus programs.
7. Future Trends
AI-Driven Analysis: Greater reliance on deep learning for detecting sophisticated malware.
Behavioral Analysis: Shift towards analyzing program intentions over static/dynamic properties.
Real-Time Monitoring: Systems that work seamlessly in live environments.
Integration: Unified systems combining multiple analysis techniques.
What is an Intruder ?
Types of Intruders
External Intruders:
Internal Intruders:
Automated Intruders:
It examines data from all devices in the network and checks it against known
attack patterns.
How it works:
How it works:
How it works:
Advantages:
Hybrid IDS offers a comprehensive solution for detecting threats across hosts and
networks.
Strengths:
Limitations:
Cannot detect new or unknown malware attacks since their patterns are
not yet available.
This method is fast and accurate for known threats but less effective for zero-day
attacks.
How it works:
Advantages:
A Firewall:
An IDS:
Conclusion
Example: Rootkits.
Logic Bombs Trigger harmful actions when specific conditions are met.