UCSY's Research Repository

Proposed ApplicableFramework for Extracting Rootkits Features and Clustering through Dynamic Analysis for Incident Handling Systems

Show simple item record

dc.contributor.author San, Cho Cho
dc.contributor.author Thwin, Mie Mie Su
dc.date.accessioned 2019-07-12T03:38:35Z
dc.date.available 2019-07-12T03:38:35Z
dc.date.issued 2017-02-16
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/802
dc.description.abstract Today’s threats have become complex multi-module systems using sophisticated techniques to target and attack vulnerable systems. The use of rootkits and rootkit technologies in malware and cybercrime is increasing. To remain undetected, malware creators incorporate rootkit components to maximize their stealth capabilities. The main reason to develop this research is the longer the malware can remain undetected on a compromised machine, the more the cybercriminal can profit. Therefore, the proposed system will focus on analyzing the kernel and user level rootkits based on Window operating system with Cuckoo sandbox. This system performs automated and manual analysis for ensuring the important of their characteristics. The objectives are to identify the rootkits based on their natures and complexity, and to propose feature extraction algorithm for improving the detection model.Effective MalwareFeature Extraction Algorithm(EMFEA) is proposed in this framework for detecting the future malware in Incident Handling Systems. Moreover, the proposed system categorizes the rootkits based on their relevant and prominent features by using Hierarchical Clustering algorithm in WEKA. en_US
dc.language.iso en en_US
dc.publisher Fifteenth International Conference on Computer Applications(ICCA 2017) en_US
dc.subject Rootkit en_US
dc.subject feature extraction en_US
dc.subject Hierarchical Clustering en_US
dc.title Proposed ApplicableFramework for Extracting Rootkits Features and Clustering through Dynamic Analysis for Incident Handling Systems en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics