• DocumentCode
    2820816
  • Title

    An Automatic Identification of a Damaged Malicious File Using HMM against Anti-Forensics

  • Author

    Ryu, Dongju ; Minsoo Kim ; Kim, Yong-Min

  • Author_Institution
    Mokpo Univ., UNETsystem Corp., Chonnam
  • Volume
    1
  • fYear
    2008
  • fDate
    2-4 Sept. 2008
  • Firstpage
    177
  • Lastpage
    184
  • Abstract
    These days, an increasing use of Internet has brought many trials to steal personal information. These unlawful users usually hide their own crime evidence or destroy evidence against their being arrested, which disturbs investigation. To come up with this, investigators use various methods to find evidence, and forensics investigation technique is also developing. Forensics tools can recover deleted file even when it is formatted. However, it is hard to know the original attributes when the header of a file is damaged. Data carving skill supports restoration techniques partly, but it canpsilat find the attributes of clusters in small unit. In this paper, we study a way to find out attributes of original file even with small clusters. We also find a method to decide if a damaged file is malignancy or not by analyzing the properties of execution file. We use HMMpsilas modeling techniques for auto-detect method, and propose estimation method to identify malicious file information. Finally, we test the whole process of analyzing clusters after formatting a real system with an attack code for disturbing its recovery.
  • Keywords
    Internet; hidden Markov models; security of data; HMM; Internet; anti-forensics; automatic file identification; damaged malicious file; forensics investigation; hidden Markov model; personal information; Accidents; Computer networks; Forensics; Hidden Markov models; IP networks; Information management; Information technology; Internet; Layout; System testing; Anti-Forensics; Damaged Malicious File; File Recovery; Forensics; Identification File Type;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Networked Computing and Advanced Information Management, 2008. NCM '08. Fourth International Conference on
  • Conference_Location
    Gyeongju
  • Print_ISBN
    978-0-7695-3322-3
  • Type

    conf

  • DOI
    10.1109/NCM.2008.255
  • Filename
    4624000