Skip to main content

An Experimental Approach to Unravel Effects of Malware on System Network Interface

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 612))

Abstract

Malware is malicious code that tends to take control of the system remotely. The author of these codes drops their malicious payload on to the vulnerable system and continues to maintain access to this system at will. In order to unravel and establish the ability of rootkit to hide system network interface, we developed a network model, and implementation of this model was carried out on four notable live rootkits. Our results show the ability of the four rootkits to hide the system network interfaces, which are being used by the attackers to gain access and communicate correctly with the compromised system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Huda S, Islam R, Abawajy J, Yearwood J, Hassan MM, Fortino G (2018) A hybrid-multi filter-wrapper framework to identify run-time behaviour for fast malware detection. Future Gener Comput Syst 83:193–207

    Article  Google Scholar 

  2. Nikolopoulos SD, Polenakis I (2017) Preventing malware pandemics in mobile devices by establishing response-time bounds. J Inf Secur Appl 37:1–14

    Google Scholar 

  3. Salehi Z, Sami A, Ghiasi M (2014) Using feature generation from API calls for malware detection. Comput Fraud Secur 2014(9):9–18

    Article  Google Scholar 

  4. Marpaung JAP, Sain M, Hoon-Jae L (2012) Survey on malware evasion techniques: state of the art and challenges. In: 2012 14th International Conference Advanced Communication Technology (ICACT), pp 744–749 ISSN: 1738-9445. Retrieved from http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6174775

  5. Hwang HJ, Tak JI, Nah SY (2011) The perception of computer security focused on the familiarity of rootkits in Korea and Kazakhstan. Int J Softw Eng Appl 5(2):13–24

    Google Scholar 

  6. Chalurkar SN, Meshram BB (2012) Detection of traditional and new types of Malware using Host-based detection scheme. Int J Adv Res Comput Eng Technol (IJARCET) 1(4):341

    Google Scholar 

  7. Carvey H (2014) Malware detection. Windows forensic analysis toolkit, Chapter six, 4th edn. Advanced Analysis Techniques for Windows 8, pp 169–209

    Google Scholar 

  8. Maiorca D, Ariu D, Corona I, Aresu M, Giacinto G (2015) Stealth attacks: an extended insight into the obfuscation effects on android malware. Comput Secur 51:16–31

    Article  Google Scholar 

  9. Miller LC, Gregory PH (2016) CISSP for dummies. Wiley

    Google Scholar 

  10. Bazargan F, Yeun CY, Zemerly MJ (2012) State-of-the-art of virtualization, its security threats and deployment models. Int J Inf Secur Res (IJISR) 2(3/4):335–343

    Article  Google Scholar 

  11. Cheenu MS (2014) A review of ZeroAccess peer-to-peer Botnet. Int J Comput Trends Technol (IJCTT) 12(2). Retrieved from http://www.ijcttjournal.org/Volume12/number-2/IJCTT-V12P112.pdf

  12. Kornblum JD, ManTech C (2006) Exploiting the rootkit paradox with windows memory analysis. Int J Digital Evid 5(1):1–5

    Google Scholar 

  13. Rrushi, JL (2016) NIC displays to thwart malware attacks mounted from within the OS. Comput Secur 61:59–71

    Article  Google Scholar 

  14. Nguyen G, Nguyen BM, Tran D, Hluchy L (2018) A heuristics approach to mine behavioural data logs in mobile malware detection system. Data Knowl Eng

    Google Scholar 

  15. Abazari F, Analoui M, Takabi H (2016) Effect of anti-malware software on infectious nodes in cloud environment. Comput Secur 58:139–148

    Article  Google Scholar 

  16. Genge B, Graur F, Haller P (2015) Experimental assessment of network design approaches for protecting industrial control systems. Int J Crit Infrastruct Prot 11:24–38

    Article  Google Scholar 

  17. Ding Y, Xia X, Chen S, Li Y (2018) A malware detection method based on family behavior graph. Comput Secur 73:73–86

    Article  Google Scholar 

  18. Lin C-H, Pao H-K, Liao J-W (2018) Efficient dynamic malware analysis using virtual time control mechanics. Comput Secur 73:359–373

    Article  Google Scholar 

  19. Talha, KA, Alper DI, Aydin C (2015) APK auditor: permission-based Android malware detection system. Digital Investig 13:1–14

    Article  Google Scholar 

  20. Alam S, Horspool RN, Traore I, Sogukpinar I (2015) A framework for metamorphic malware analysis and real-time detection. Comput Secur 48:212–233

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sanjay Misra .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Subairu, S.O. et al. (2020). An Experimental Approach to Unravel Effects of Malware on System Network Interface. In: Jain, V., Chaudhary, G., Taplamacioglu, M., Agarwal, M. (eds) Advances in Data Sciences, Security and Applications. Lecture Notes in Electrical Engineering, vol 612. Springer, Singapore. https://doi.org/10.1007/978-981-15-0372-6_17

Download citation

Publish with us

Policies and ethics