Abstract
This research is used to consolidate and standardize a centralized anti-malware approach, helping the malware analysis team have a total solution that makes malware investigation and analysis simpler through thereby tracing the source of the malicious code. By aggregating the world’s leading solutions as well as some self-developed solutions, it provides the most efficient centralized malware detection, analysis, and treatment. The solution will divide the malware analysis team into two different teams. Each team will have a different specific mission. The first team will be provided with toolkits to research and analyze malicious code and clarify the harmful effects of malicious code affecting the system. The second team will be tasked with receiving analytical information from team one and using that information to find the source of malicious code on a number of network intelligence sources through which to find solutions to deal with malicious code, identify the source of malicious code, and identify hacker group is attacking the organization. The teaming and provision of these solution-specific tools will provide a complete process for the organization's malware research team to have a malware handling process as well as useful tools for analysis, handle, and find the source of malicious code.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Payne BD (2012) Simplifying virtual machine introspection using LibVMI. United States: N. p., Web. https://doi.org/10.2172/1055635
Deepa S, Zhi W, Xuxian J, Dongyan X (2011) Process out-grafting: an efficient “out-of-VM” approach for fine-grained process execution monitoring. In: Proceedings of the 18th ACM conference on computer and communications security (CCS ‘11). Association for computing machinery, New York, NY, USA, pp 363–374. https://doi.org/10.1145/2046707.2046751
Xiaosong Z, Xiaohui P, Xiaoshu L (2009) Analysis of virtual machine applied to Malware detection system. In: Proceedings of the international symposium on information engineering and electronic commerce, pp 290–294. https://doi.org/10.1109/IEEC.2009.66
Ding Z, Cui L, Fei H, Yan L, Hao Z, Wang Y (2020) A high-efficiency and comprehensive dynamic behavior analysis system for Malware based on hardware virtualization. In: Proceedings of the IEEE 22nd international conference on high performance computing and communications. In: IEEE 18th international conference on smart city; IEEE 6th international conference on data science and systems (HPCC/SmartCity/DSS), pp 722–727. https://doi.org/10.1109/HPCC-SmartCity-DSS50907.2020.00094
Saurabh (2018) Advance Malware analysis using static and dynamic methodology. In: Proceedings of the international conference on advanced computation and telecommunication (ICACAT), pp 1–5. https://doi.org/10.1109/ICACAT.2018.8933769
Willems C, Holz T, Freiling F (2017) Toward automated dynamic Malware analysis using CWS and box. In: IEEE security & privacy, vol 5, no 2, pp 32–39. https://doi.org/10.1109/MSP.2007.45
Guarnieri C, Schloesser M, Bremer J, Tanasi A.: Cuckoo sandbox-open source automated malware analysis. Black Hat USA (2013)
Junling W, Cuifang G, Zhendong W, Yan C (2020) Malicious code family classification based on multi-feature fusion fractional Kalman filter. In: Proceedings of the 3rd international conference on artificial intelligence and big data (ICAIBD), pp 314–317. https://doi.org/10.1109/ICAIBD49809.2020.9137472
Samtani S, Chinn K, Larson C, Chen H (2016) AZSecure hacker assets portal: cyber threat intelligence and malware analysis. In: Proceedings of the IEEE conference on intelligence and security informatics (ISI), pp 19–24. https://doi.org/10.1109/ISI.2016.7745437
Cuong LG, Hung PD, Vinh BT (2018) Migrating Vietnam offshore into Agile. In: Proceedings of the ninth international symposium on information and communication technology, SoICT 2018. Association for computing machinery, New York, NY, USA, pp 329–336
Quy T, Hung PD (2022) Flexible information system infrastructure solutions for small and medium enterprises. In: Luo Y (eds) Cooperative design, visualization, and engineering. CDVE 2021. Lecture notes in computer science, vol 13492. Springer, Cham
Huy AQ, Hung PD (2019) Security and cost optimization auditing for amazon web services. In: Proceedings of the 2nd international conference on software engineering and information management, ICSIM 2019. Association for computing machinery, New York, NY, USA, pp 44–48
Hung PD, Giang TM, Nam LH, Duong PM, Van Thang H, Diep VT (2020) Smarthome control unit using vietnamese speech command. In: Vasant P, Zelinka I, Weber GW (eds) Intelligent computing and optimization. ICO 2019 advances in intelligent systems and computing, vol 1072. Springer, Cham
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Anh, D.T., Vinh, B.T., Lam, P.T., Hung, P.D. (2023). Clean Room System for Malware Analysis. In: Kaiser, M.S., Xie, J., Rathore, V.S. (eds) Information and Communication Technology for Competitive Strategies (ICTCS 2022). Lecture Notes in Networks and Systems, vol 615. Springer, Singapore. https://doi.org/10.1007/978-981-19-9304-6_39
Download citation
DOI: https://doi.org/10.1007/978-981-19-9304-6_39
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-9303-9
Online ISBN: 978-981-19-9304-6
eBook Packages: EngineeringEngineering (R0)