CS 6262 Network Security Assignment Problem

Assignment Help Computer Network Security
Reference no: EM132395349

CS 6262 - Network Security
Georgia Institute of Technology
Project: Malware Analysis

Android Malware

Scenario
• Analyzing Windows Malware
• You got a malware sample from the wild. Your task is to discover what the malware does by analyzing it
• How do you discover the malware's behaviors?
• Static Analysis
• Manual Reverse Engineering
• Programming binary analysis
• Dynamic Analysis
• Network behavioral tracing
• Run-time system behavioral tracing(File/Process/Thread/Registry)
• Symbolic Execution
• Fuzzing
• In our scenario, you are going to analyze the given malware with tools that we provide.
• These tools help you to analyze the malware with static and dynamic analysis.
• Objective
1. Find which server controls the malware (the command and control (C2) server)
2. Discover how the malware communicates with the command and control (C2) server
• URL and Payload
3. Discover what activities are done by the Linux malware
• Attack activities

Requirement

• Make sure that no malware traffic goes out from the virtual machine
• But, updating the malware (stage 2), and downloading the Linux malware (stage 3) must be allowed for us to understand the malware's behavior
• The command and control server is dead. You need to reconstruct it
• Use tools to reconstruct the server, then reveal hidden behaviors of the malware
• Analyze network traffic on the host, and figure out the list of available commands for the malware
• Analyze network traffic trace of the host, and figure out what malware does
• Write down your answer into assignment-questionnaire.txt

Android Malware Analysis
• Manifest Analysis
• Identifying suspicious components
• Static Analysis
• Search for C&C commands and trigger conditions
• Vet the app for any anti-analysis techniques that need to be removed.
• Dynamic analysis
• Leverage the information found via static analysis to trigger the malicious behavior.

Manifest Analysis
• Identify suspicious components
• Broadcast receivers registering for suspicious actions.
• Background services

Attachment:- Advanced Malware Analysis.rar

Reference no: EM132395349

Questions Cloud

Determine the present value of growth opportunities : Determine the present value of growth opportunities for a company with a leading EPS of $1.5, a required rate of return of 10 percent, and a current stock price
What strategies can you use to enhance your creativity : Evaluate yourself using the three indices of creativity. What strategies can you use to enhance your creativity? At least 600 words with APA references.
What are at least two factors that contribute to complexity : Information and Communication Technology Policy Making is a complex process in which many stakeholders are involved. What are at least two factors.
Defined asymptotic stability : Asymptotic stability is defined by? In induction motor when length of airgap increased, the megenetizing current increase while short circuit current remains
CS 6262 Network Security Assignment Problem : CS 6262 Network Security Assignment Help and Solution, Georgia Institute of Technology, Homework Help - Analyze network traffic on the host.
Write sample instructions on how to use the kiosk : Write sample instructions on how to use the kiosk. The library intends to post these instructions on a sign next to the kiosk, so they must be short.
Organizations interested in fostering good business ethics : Why are organizations interested in fostering good business ethics? What approach can you take to ensure ethical decision making?
What measures would you take to engage stakeholders : Create a new thread. As indicated above, you will assume the role of project manager of a project to develop a comprehensive policy for managing pedestrian.
Separate engineering management systems : An agency has focused its system development and critical infrastructure data collection efforts on separate engineering management systems

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd