A study on the live forensic techniques for anomaly detection in user terminals

Ae Chan Kim, Won Hyung Park, Dong Hoon Lee

Research output: Contribution to journalArticle

6 Citations (Scopus)

Abstract

Digital forensics techniques that have been used to analyze system intrusion incidents traditionally are used to detect anomaly behavior that may occur in the user terminal environment. Particularly, for the method to analyze user terminals, automated live forensics techniques that are used as supporting tool for malicious code (malware) detection. We suggest a way to take advantage of the live forensic techniques for the anomaly detection of malware.

Original languageEnglish
Pages (from-to)181-188
Number of pages8
JournalInternational Journal of Security and its Applications
Volume7
Issue number1
Publication statusPublished - 2013 May 10

Fingerprint

Malware
Digital forensics

Keywords

  • Anomaly detection
  • Live forensics
  • Malware
  • User terminals

ASJC Scopus subject areas

  • Computer Science(all)

Cite this

A study on the live forensic techniques for anomaly detection in user terminals. / Kim, Ae Chan; Park, Won Hyung; Lee, Dong Hoon.

In: International Journal of Security and its Applications, Vol. 7, No. 1, 10.05.2013, p. 181-188.

Research output: Contribution to journalArticle

@article{690a0eb25122424698db05a232fa5a20,
title = "A study on the live forensic techniques for anomaly detection in user terminals",
abstract = "Digital forensics techniques that have been used to analyze system intrusion incidents traditionally are used to detect anomaly behavior that may occur in the user terminal environment. Particularly, for the method to analyze user terminals, automated live forensics techniques that are used as supporting tool for malicious code (malware) detection. We suggest a way to take advantage of the live forensic techniques for the anomaly detection of malware.",
keywords = "Anomaly detection, Live forensics, Malware, User terminals",
author = "Kim, {Ae Chan} and Park, {Won Hyung} and Lee, {Dong Hoon}",
year = "2013",
month = "5",
day = "10",
language = "English",
volume = "7",
pages = "181--188",
journal = "International Journal of Security and its Applications",
issn = "1738-9976",
publisher = "Science and Engineering Research Support Society",
number = "1",

}

TY - JOUR

T1 - A study on the live forensic techniques for anomaly detection in user terminals

AU - Kim, Ae Chan

AU - Park, Won Hyung

AU - Lee, Dong Hoon

PY - 2013/5/10

Y1 - 2013/5/10

N2 - Digital forensics techniques that have been used to analyze system intrusion incidents traditionally are used to detect anomaly behavior that may occur in the user terminal environment. Particularly, for the method to analyze user terminals, automated live forensics techniques that are used as supporting tool for malicious code (malware) detection. We suggest a way to take advantage of the live forensic techniques for the anomaly detection of malware.

AB - Digital forensics techniques that have been used to analyze system intrusion incidents traditionally are used to detect anomaly behavior that may occur in the user terminal environment. Particularly, for the method to analyze user terminals, automated live forensics techniques that are used as supporting tool for malicious code (malware) detection. We suggest a way to take advantage of the live forensic techniques for the anomaly detection of malware.

KW - Anomaly detection

KW - Live forensics

KW - Malware

KW - User terminals

UR - http://www.scopus.com/inward/record.url?scp=84877115294&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84877115294&partnerID=8YFLogxK

M3 - Article

AN - SCOPUS:84877115294

VL - 7

SP - 181

EP - 188

JO - International Journal of Security and its Applications

JF - International Journal of Security and its Applications

SN - 1738-9976

IS - 1

ER -