A study on the live forensic techniques for anomaly detection in user terminals

Ae Chan Kim, Won Hyung Park, Dong Hoon Lee

Research output: Contribution to journalArticle

8 Citations (Scopus)

Abstract

Digital forensics techniques that have been used to analyze system intrusion incidents traditionally are used to detect anomaly behavior that may occur in the user terminal environment. Particularly, for the method to analyze user terminals, automated live forensics techniques that are used as supporting tool for malicious code (malware) detection. We suggest a way to take advantage of the live forensic techniques for the anomaly detection of malware.

Original languageEnglish
Pages (from-to)181-188
Number of pages8
JournalInternational Journal of Security and its Applications
Volume7
Issue number1
Publication statusPublished - 2013 May 10

Keywords

  • Anomaly detection
  • Live forensics
  • Malware
  • User terminals

ASJC Scopus subject areas

  • Computer Science(all)

Fingerprint Dive into the research topics of 'A study on the live forensic techniques for anomaly detection in user terminals'. Together they form a unique fingerprint.

  • Cite this