NUST Institutional Repository

INCIDENT RESPONSE MODEL FOR PROACTIVE MALWARE DETECTION IN SMART DEVICES

Show simple item record

dc.contributor.author Hameed, Amna
dc.date.accessioned 2023-12-18T07:17:37Z
dc.date.available 2023-12-18T07:17:37Z
dc.date.issued 2023
dc.identifier.other 364734
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/41259
dc.description Supervisor: Dr. Mehdi Hussain en_US
dc.description.abstract Extensive usage of the Internet is increasing the risk of malware attacks on smart devices. Implementing security controls in these devices is challenging due to their limited processing and computation power. Different methods detect malware in smart devices through live forensics, memory analysis, and timeline reconstruction. However, these solutions provide only a limited number of artifacts and techniques. There is a need for a forensic investigation model that identify the most suitable set of paths and artifacts to detect the malware presence effectively. This study proposed an incident response model for detecting malware by employing a digital forensic methodology. The proposed model consists of three phases: proactive, reactive, and forensic process. The study extends the smart device forensic process into four modules (1) acquire & extract, (2) detect, (3) investigate and, (4) validate & report. The experiments are conducted on Android devices with the latest APKs malware. The proposed model carefully examined and identified 11 different folder paths such as /data/data, /data/app, /system/app, /system/data. These paths contain useful artifacts for investigation. The systematic examination of paths and corresponding artifacts helps to construct the timeline of APK download URI, installation, traces, activity, intent, and system permissions acquired by user-installed applications. The proposed model also correlates the changes in system paths and files made by different user-installed applications. Similarly, the proposed system is capable to identify the user-installed malware and benign applications. To prove the effectiveness of results these suspicious applications are verified by Cuckoo Sandbox for validation purposes. en_US
dc.language.iso en en_US
dc.publisher School of Electrical Engineering and Computer Sciences (SEECS), NUST en_US
dc.title INCIDENT RESPONSE MODEL FOR PROACTIVE MALWARE DETECTION IN SMART DEVICES en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

  • MS [146]

Show simple item record

Search DSpace


Advanced Search

Browse

My Account