Automated process workflow for malware analysis
Malware is short for malicious software, by embedding a malicious script into a software once executed can cause harmful damages to the computer system such as removing or encrypting files . Malware detection techniques are constantly evolving to keep up with the growing number of malware spices in...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/148404 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-148404 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1484042023-07-07T18:16:46Z Automated process workflow for malware analysis Lin, Haiqiang Ma Maode School of Electrical and Electronic Engineering EMDMa@ntu.edu.sg Engineering::Electrical and electronic engineering::Computer hardware, software and systems Malware is short for malicious software, by embedding a malicious script into a software once executed can cause harmful damages to the computer system such as removing or encrypting files . Malware detection techniques are constantly evolving to keep up with the growing number of malware spices in the IT world. The timely and effectively of detection techniques can determine the critical timeline and save huge amount of infrastructure from being damage by the newly develop malwares. Over the years the use of machine learning, and automatic intelligence have shown the improvement in the rate of malware classification and detection. This report focuses on the research and development of a fully automated process workflow in detecting the malwares from the various file formats and to provide accurate detection result for enterprise to counter against phishing emails. It is essential in today’s corporate world to prevent malwares such as ransomware from damaging critical information infrastructure systems which is commonly found in email attachments. The attackers use phishing as an attack vectors to lure victim into executing the malicious software. Bachelor of Engineering (Electrical and Electronic Engineering) 2021-05-01T13:17:57Z 2021-05-01T13:17:57Z 2021 Final Year Project (FYP) Lin, H. (2021). Automated process workflow for malware analysis. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/148404 https://hdl.handle.net/10356/148404 en P3054-192 application/pdf Nanyang Technological University |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Electrical and electronic engineering::Computer hardware, software and systems |
spellingShingle |
Engineering::Electrical and electronic engineering::Computer hardware, software and systems Lin, Haiqiang Automated process workflow for malware analysis |
description |
Malware is short for malicious software, by embedding a malicious script into a software once executed can cause harmful damages to the computer system such as removing or encrypting files . Malware detection techniques are constantly evolving to keep up with the growing number of malware spices in the IT world. The timely and effectively of detection techniques can determine the critical timeline and save huge amount of infrastructure from being damage by the newly develop malwares. Over the years the use of machine learning, and automatic intelligence have shown the improvement in the rate of malware classification and detection.
This report focuses on the research and development of a fully automated process workflow in detecting the malwares from the various file formats and to provide accurate detection result for enterprise to counter against phishing emails. It is essential in today’s corporate world to prevent malwares such as ransomware from damaging critical information infrastructure systems which is commonly found in email attachments. The attackers use phishing as an attack vectors to lure victim into executing the malicious software. |
author2 |
Ma Maode |
author_facet |
Ma Maode Lin, Haiqiang |
format |
Final Year Project |
author |
Lin, Haiqiang |
author_sort |
Lin, Haiqiang |
title |
Automated process workflow for malware analysis |
title_short |
Automated process workflow for malware analysis |
title_full |
Automated process workflow for malware analysis |
title_fullStr |
Automated process workflow for malware analysis |
title_full_unstemmed |
Automated process workflow for malware analysis |
title_sort |
automated process workflow for malware analysis |
publisher |
Nanyang Technological University |
publishDate |
2021 |
url |
https://hdl.handle.net/10356/148404 |
_version_ |
1772827614963040256 |