From Malware Testing to Virtualization

被引:0
|
作者
Revay, Lukas [1 ]
机构
[1] VSB Tech Univ Ostrava, 17 Listopadu Str,15-2172, Ostrava 70833, Czech Republic
关键词
alpine; image; container; Qt5; framework; C plus; nmap; ssh; udp; LAN; worm;
D O I
10.1016/j.procs.2019.02.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Viruses are everywhere around us. Not only in our environment but also in virtual environment we are now using on daily basis. To be able to predict their growth it is necessary to understand them or even to develop them. The main problem was how to get rid of any harm in computer or even infrastructure and still be possible to simulate infiltration. Of course it is not an infiltration from real deep point of view. This paper describes how this problem was handled, which type of malware was used, briefly introduces its implementation and also virtual environment this threat was tested. As preferred virtualization tool docker was chosen. Images created in docker and after then run as a containers fit to this work. Alpine was chosen as mini virtual docker image for our purposes. For implementation part C++ and a Qt5 framework was utilized to reduce the time with implementation which are already done. Frameworks or OS -es do not provide all important tools and this happened also in this case. Because of that some additional tools has been installed. Most of them are network based tools which are important for this work because this worm implementation communicates over the LAN and communication is on udp based packets. Result of this investigation is fully virtual platform which can be used for testing and improved also for other types of features related to viral usage. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:751 / 756
页数:6
相关论文
共 50 条
  • [1] Hiding virtualization from attackers and malware
    Carpenter, Matthew
    Liston, Tom
    Skoudis, Ed
    IEEE SECURITY & PRIVACY, 2007, 5 (03) : 62 - 65
  • [2] Holography: A Hardware Virtualization Tool for Malware Analysis
    Dai, Shih-Yao
    Fyodor, Yarochkin
    Wu, Jain-Shing
    Lin, Chih-Hung
    Huang, Yennun
    Kuo, Sy-Yen
    IEEE 15TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2009, : 263 - +
  • [3] Malware Virtualization-Resistant Behavior Detection
    Sun, Ming-Kung
    Lin, Mao-Jie
    Chang, Michael
    Laih, Chi-Sung
    Lin, Hui-Tang
    2011 IEEE 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS), 2011, : 912 - 917
  • [4] Sandboxing and Virtualization Modern Tools for Combating Malware
    Greamo, Chris
    Ghosh, Anup
    IEEE SECURITY & PRIVACY, 2011, 9 (02) : 79 - 82
  • [5] Ether: Malware Analysis via Hardware Virtualization Extensions
    Dinaburg, Artem
    Royal, Paul
    Sharif, Monirul
    Lee, Wenke
    CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 51 - 62
  • [6] Unknown Malware Detection Based on the Full Virtualization and SVM
    Zhao, Hengli
    Zheng, Ning
    Li, Jian
    Yao, Jingjing
    Hou, Qiang
    ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 473 - +
  • [7] Application Virtualization Techniques for Malware Forensics in Social Engineering
    Joe-Uzuegbu, C. K.
    Iwuchukwu, U. C.
    Ezema, L. C.
    2015 INTERNATIONAL CONFERENCE ON CYBERSPACE (CYBER-ABUJA), 2015, : 45 - 56
  • [8] Malware Analysis System using Process-level Virtualization
    Adachi, Yu
    Oyama, Yoshihiro
    ISCC: 2009 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, 2009, : 549 - 555
  • [9] Using Virtualization for Blockchain Testing
    Chen, Chen
    Qi, Zhuyun
    Liu, Yirui
    Lei, Kai
    SMART COMPUTING AND COMMUNICATION, SMARTCOM 2017, 2018, 10699 : 289 - 299
  • [10] Detection of metamorphic and virtualization-based malware using algebraic specification
    Webster, Matt
    Malcolm, Grant
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2009, 5 (03): : 221 - 245