Automated malware behaviour analysis for IoT technologies

As we transition our society into the digital age, the increasing prevalence of IoT Networks and devices will require more cybersecurity personnel to keep these IoT systems secure. A key part of doing this would require personnel to conduct malware analysis on malicious software, to understand th...

Full description

Saved in:
Bibliographic Details
Main Author: Lee, John Kai Jie
Other Authors: Liu Yang
Format: Final Year Project
Language:English
Published: Nanyang Technological University 2023
Subjects:
Online Access:https://hdl.handle.net/10356/166124
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-166124
record_format dspace
spelling sg-ntu-dr.10356-1661242023-04-28T15:40:15Z Automated malware behaviour analysis for IoT technologies Lee, John Kai Jie Liu Yang School of Computer Science and Engineering yangliu@ntu.edu.sg Engineering As we transition our society into the digital age, the increasing prevalence of IoT Networks and devices will require more cybersecurity personnel to keep these IoT systems secure. A key part of doing this would require personnel to conduct malware analysis on malicious software, to understand their inner workings and how to combat them. To do so, requires learning the complex malware analysis process. Currently, this involves having to utilize a myriad of basic analysis tools, as well as advanced reverse engineering. However, there is a great level of difficulty involved in parsing convoluted binary data. New analyst may not be familiar how and what tools to use for basic analysis. And even those familiar with malware analysis may not be comfortable with reverse engineering a binary and understanding its workings from its assembly listing. This includes two key components. Firstly, we will compile a list of currently available analysis tools and simplify the analysis process by developing a malware analysis framework that outlines the key data points to look for during analysis. This will provide analysts with the necessary tools and information needed to conduct effective malware analysis. Secondly, we will showcase advanced analysis techniques by providing analysis scripts that automate the reverse engineering process in malware analysis. To test the accuracy of our behaviour classification system, we conduct analysis on known malware samples using our framework and analysis script. Afterwhich, we compare the detection accuracy using the script and determine how much malware behaviour it was able to detect. The results show that following our framework and script, we were able to detect over 80% of the key malware behaviours in the known malware sample, showing a more simplified malware analysis process to facilitate in learning. Bachelor of Engineering (Computer Science) 2023-04-24T00:37:00Z 2023-04-24T00:37:00Z 2023 Final Year Project (FYP) Lee, J. K. J. (2023). Automated malware behaviour analysis for IoT technologies. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/166124 https://hdl.handle.net/10356/166124 en SCSE22-0588 application/pdf Nanyang Technological University
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering
spellingShingle Engineering
Lee, John Kai Jie
Automated malware behaviour analysis for IoT technologies
description As we transition our society into the digital age, the increasing prevalence of IoT Networks and devices will require more cybersecurity personnel to keep these IoT systems secure. A key part of doing this would require personnel to conduct malware analysis on malicious software, to understand their inner workings and how to combat them. To do so, requires learning the complex malware analysis process. Currently, this involves having to utilize a myriad of basic analysis tools, as well as advanced reverse engineering. However, there is a great level of difficulty involved in parsing convoluted binary data. New analyst may not be familiar how and what tools to use for basic analysis. And even those familiar with malware analysis may not be comfortable with reverse engineering a binary and understanding its workings from its assembly listing. This includes two key components. Firstly, we will compile a list of currently available analysis tools and simplify the analysis process by developing a malware analysis framework that outlines the key data points to look for during analysis. This will provide analysts with the necessary tools and information needed to conduct effective malware analysis. Secondly, we will showcase advanced analysis techniques by providing analysis scripts that automate the reverse engineering process in malware analysis. To test the accuracy of our behaviour classification system, we conduct analysis on known malware samples using our framework and analysis script. Afterwhich, we compare the detection accuracy using the script and determine how much malware behaviour it was able to detect. The results show that following our framework and script, we were able to detect over 80% of the key malware behaviours in the known malware sample, showing a more simplified malware analysis process to facilitate in learning.
author2 Liu Yang
author_facet Liu Yang
Lee, John Kai Jie
format Final Year Project
author Lee, John Kai Jie
author_sort Lee, John Kai Jie
title Automated malware behaviour analysis for IoT technologies
title_short Automated malware behaviour analysis for IoT technologies
title_full Automated malware behaviour analysis for IoT technologies
title_fullStr Automated malware behaviour analysis for IoT technologies
title_full_unstemmed Automated malware behaviour analysis for IoT technologies
title_sort automated malware behaviour analysis for iot technologies
publisher Nanyang Technological University
publishDate 2023
url https://hdl.handle.net/10356/166124
_version_ 1765213873430855680