Sandbox software
Malware is an issue for most computer and network users (Masud et al., 2011). Moreover, the number of malicious software has significantly increased; therefore, the chances of getting infected by malware could be high(Sun, Fujino, and Mori, 2016). Yet, some security measures can be applied to minimise the possibility of infection.
1- Signature base-detection.
Antiviruses software uses signature-base detection, which compares the signature file against the known signature of the viruses stored in the software database (Davis et al., 2009). However, because of the malware industry's fast move, more than 300,000 malware are detected daily. Thus, the antivirus vendors update their database with the new signatures and release new updates to the software. Thus, the antivirus software does not work effectively if the user does not update it (Fujino, and Mori, 2016).
Author's work |
2- heuristics (sandbox)
Sandbox is a dynamic heuristic method. This mechanism works by isolating the file to be examined in a virtual environment and run it to check its behaviour. If the file showed any malicious behaviors such as, if the file replicates itself or deleted other files, then the file will be flagged as a virus (MalwareFox, 2019).
Author's work |
In the next couple of posts, I will talk about a specific sandbox software called Any-Run, which is available online. I am going to talk about its functionalities and examine it and share my outcomes.
References:
Davis, M., Bodmer, S., LeMasters, A., and LeMasters, A., 2009. Hacking Exposed. [ebook] New York, USA: McGraw-Hill Professional Publishing. Available at: <https://ebookcentral.proquest.com/lib/dmu/reader.action?docID=4657740> [Accessed 27 November 2020].
Masud, M., Khan, L., Thuraisingham, B., and J. Andreasson, K., 2011. Data Mining Tools For Malware Detection. 1st ed. [ebook] Auerbach Publishers, Incorporated, p.37. Available at: <https://ebookcentral.proquest.com/lib/dmu/detail.action?docID=826949> [Accessed 18 October 2020].
MalwareFox, 2019. What Is Heuristic Analysis In Antimalware | How Does It Add More Protection?. [video] Available at <https://www.youtube.com/watch?v=fnfHZ1q8sEA> [Accessed 27 November 2020].
Sun, B., Fujino, A., and Mori, T., 2016. POSTER. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, [online] pp.1814-1816. Available at: <https://dl.acm.org/doi/10.1145/2976749.2989064> [Accessed 27 November 2020].
Hi Reema,
ReplyDeleteNice idea to show the Sandbox software, nice and clear diagrams as well.
One thing, which you can improve is referencing. I mean references should be in alphabetical order.
I've done that as you asked me. Thank you Daniel.
ReplyDelete