• DocumentCode
    3714898
  • Title

    Application virtualization techniques for malware forensics in social engineering

  • Author

    C. K Joe-Uzuegbu;U. C. Iwuchukwu;L. C Ezema

  • Author_Institution
    Department of Electrical/ Electronic Engineering, Federal University of Technology Owerri, Imo State Nigeria
  • fYear
    2015
  • Firstpage
    45
  • Lastpage
    56
  • Abstract
    There is an increased trend in information insecurity, online fraud and social engineering activities today as a result of high dependence on the Internet and social networks for communication, advertisement of products and services, etc. Malwares are most times, deliberately programmed as worms to appear as flash messages, online games, gift awards and in many other attractive forms for the user to access just at the click of a button. Several methods have been applied to minimize these infiltrations which include firewalls and anti-viruses. However when confronted with a system infected with malware, a person´s ability to investigate the system successfully depends on his knowledge, experience, and toolset. This is where there is a conundrum. People tend to avoid dealing with malware cases on their own due to inexperience and lack of knowledge but would rather outsource it to IT professionals either hired at that particular instance or employed within their organization. However, through careful preparation one can acquire knowledge, experience, and toolset that can eventually lead to working malware cases. The various procedures for investigating infiltrations into supposedly secure networks and computer systems are presented in this paper.
  • Keywords
    "Computers","Virtual machining","Malware","Virtualization","Hardware","Operating systems"
  • Publisher
    ieee
  • Conference_Titel
    Cyberspace (CYBER-Abuja), 2015 International Conference on
  • Type

    conf

  • DOI
    10.1109/CYBER-Abuja.2015.7360508
  • Filename
    7360508