Browse > Article
http://dx.doi.org/10.17703/IJACT.2021.9.4.288

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code  

Kim, Hee Wan (Division of Computer Science & Engineering, Sahmyook Univ.)
Publication Information
International Journal of Advanced Culture Technology / v.9, no.4, 2021 , pp. 288-294 More about this Journal
Abstract
There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.
Keywords
Malicious code; Dynamic analysis; Static analysis; Malicious code detection; Countermeasures;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://acc.daetoo.com/secu_info_view.asp?list=/secu_info_list.asp&seq=9533&pageno=18&v_num=714
2 Vaibhav Rasgtogi, Yan Chen and Xuxian Jiang (2014), "Catch Me if You Can: Evaluating Android Antimalware against Transformation Attacks," IEEE Transactions on Information Forensics and Security, 9(1), pp. 99-108   DOI
3 H. S. Lee, and H. W. Lee (2017), "Simulated Dynamic C&C Server Based Activated Evidence Aggregation of Evasive Server-Side Polymorphic Mobile Malware on Android," International Journal of Advanced Smart Convergence, 6(1), pp. 1-8. https://doi.org/10.7236/IJASC.2017.6.1.1   DOI
4 http://blog.zeltser.com/post/4339793582/custom-signatures-for-malware-scan
5 S. Ch Lee, S. G. Lee, H. Y. Oh, and S. M. Han (2019), "Piosk: A Practical Kiosk to Prevent Information Leakage," International Journal of Advanced Smart Convergence, 8(2), pp.77-87. http://dx.doi.org/10.7236/IJASC.2019.8.2.77   DOI
6 https://jianna6.tistory.com/entry
7 J. Y. Kim, J. L. Lee, E. J. Park, E. Y. Jang, and H.J. Kim (2009), "A study of Modeling and Simulation for Analyzing DDoS Attack Damage Scale and Defense Mechanism Expense," Journal of the Korea Society for Simulation, 18(4), pp.39-47
8 S. J Lee, K. H. Kim, Y. G. Shin, and J. H. Yi (2018), "Design and Implementation of Anti-reversing Code Evasion Framework for Intelligent Malware Analysis, Proceedings of the Korea Information Processing Society Conference, 25(2), pp.218-221. https://doi.org/10.3745/PKIPS.y2018m10a.218