Malware attribution
The report presents the final year project to design and develop an application that performs malware attributions. Malware attributions are critical pieces of Indicators of Compromise (IOC) data to facilitate in the mapping and establishment of the observed cyber-attack. The tool aims to perform a...
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project (FYP) |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/74012 |
_version_ | 1811696595052265472 |
---|---|
author | Foo, Ce Zhi |
author2 | Lam Kwok Yan |
author_facet | Lam Kwok Yan Foo, Ce Zhi |
author_sort | Foo, Ce Zhi |
collection | NTU |
description | The report presents the final year project to design and develop an application that performs malware attributions. Malware attributions are critical pieces of Indicators of Compromise (IOC) data to facilitate in the mapping and establishment of the observed cyber-attack. The tool aims to perform a malware attribution of an input file and subsequently, outputs the analysis in a report according to a determined threat intel format. The purpose of the report is for sharing and collaboration within the community.
Prior to the start, research and study were carried out to establish and determine the tools and techniques in which the application should adopt.
The developed application involves a number of virtual machines, machine learning techniques and macros to facilitate the automated process of keeping the collection of dataset updated. A collection of dataset consisting a total of 310 malware and non-malware samples were analysed on a Windows operating system and used for machine learning. Together with the pool of training dataset analysed and the integration of other components, the developed application was able to achieve an accuracy prediction of 98% in determining if a file belongs to a malware.
The accuracy of the prediction was significant to enable the right output of report and outcome to the users. With an accurate report, cybersecurity professionals and individuals from the community can develop countermeasures to address the attack. |
first_indexed | 2024-10-01T07:41:51Z |
format | Final Year Project (FYP) |
id | ntu-10356/74012 |
institution | Nanyang Technological University |
language | English |
last_indexed | 2024-10-01T07:41:51Z |
publishDate | 2018 |
record_format | dspace |
spelling | ntu-10356/740122023-03-03T20:54:05Z Malware attribution Foo, Ce Zhi Lam Kwok Yan School of Computer Science and Engineering DRNTU::Engineering The report presents the final year project to design and develop an application that performs malware attributions. Malware attributions are critical pieces of Indicators of Compromise (IOC) data to facilitate in the mapping and establishment of the observed cyber-attack. The tool aims to perform a malware attribution of an input file and subsequently, outputs the analysis in a report according to a determined threat intel format. The purpose of the report is for sharing and collaboration within the community. Prior to the start, research and study were carried out to establish and determine the tools and techniques in which the application should adopt. The developed application involves a number of virtual machines, machine learning techniques and macros to facilitate the automated process of keeping the collection of dataset updated. A collection of dataset consisting a total of 310 malware and non-malware samples were analysed on a Windows operating system and used for machine learning. Together with the pool of training dataset analysed and the integration of other components, the developed application was able to achieve an accuracy prediction of 98% in determining if a file belongs to a malware. The accuracy of the prediction was significant to enable the right output of report and outcome to the users. With an accurate report, cybersecurity professionals and individuals from the community can develop countermeasures to address the attack. Bachelor of Engineering (Computer Science) 2018-04-23T07:06:11Z 2018-04-23T07:06:11Z 2018 Final Year Project (FYP) http://hdl.handle.net/10356/74012 en Nanyang Technological University 127 p. application/pdf |
spellingShingle | DRNTU::Engineering Foo, Ce Zhi Malware attribution |
title | Malware attribution |
title_full | Malware attribution |
title_fullStr | Malware attribution |
title_full_unstemmed | Malware attribution |
title_short | Malware attribution |
title_sort | malware attribution |
topic | DRNTU::Engineering |
url | http://hdl.handle.net/10356/74012 |
work_keys_str_mv | AT foocezhi malwareattribution |