Skip to main content
Top
Published in: Wireless Personal Communications 3/2022

25-08-2021

Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics

Authors: Sonam Bhardwaj, Mayank Dave

Published in: Wireless Personal Communications | Issue 3/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The exponential growth in technology observed over the past decade has introduced newer ways to exploit network and cyber-physical system-related vulnerabilities. Cybercriminals perform malware attacks by exploiting vulnerabilities to cause damage to a network or computer without any victim's knowledge. The attack sites from where the vulnerabilities are exploited provide concrete evidence that can be collected and used against the attackers (cybercriminals) under cyber law jurisdiction. The collected digital pieces of evidence can easily be damaged by various attack techniques. The investigation of the crime is purely dependent on the raw evidence that must be protected for correct investigation. In this article, a crypto-evidence preservation and evidence collecting model is proposed. The model is used to detect malware attacks, preserve evidence, and categorize the network traffic data into suitable classes as either malicious or non-malicious. It successfully preserves collected digital pieces of evidence and keeps them in protected mode (tamper-safe). The meta-data for malware traffic is extracted using deep learning and machine learning classifiers. The various studies have shown that deep learning supports the analysis of large data sets efficiently whereas ensemble classifiers increase the probability for better prediction analysis of malware and real-time data flowing through a network. This article proposes an ensemble classifier-based deep learning model to investigate malicious packets, preserve evidence using the SHA-256 crypto-system, learn on collected data and keep the pieces of evidence alive (availability of data) when needed in the forensic investigation on the network for a malware attack. The proposed model outperforms various existing models with an average score of 97% (F1-score) for malware detection and evidence preservation. Further, the scope of the work is discussed which can be explored by the researchers for their study.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Wu, Y., Dai, H. N., Wang, H., & Choo, K. K. R. (2021). Blockchain-based privacy preservation for 5g-enabled drone communications. IEEE Network, 35(1), 50–56.CrossRef Wu, Y., Dai, H. N., Wang, H., & Choo, K. K. R. (2021). Blockchain-based privacy preservation for 5g-enabled drone communications. IEEE Network, 35(1), 50–56.CrossRef
6.
go back to reference Naseer, H., Maynard, S. B., & Desouza, K. C. (2021). Demystifying analytical information processing capability The case of cybersecurity incident response. Decision Support Systems, 143, 113476.CrossRef Naseer, H., Maynard, S. B., & Desouza, K. C. (2021). Demystifying analytical information processing capability The case of cybersecurity incident response. Decision Support Systems, 143, 113476.CrossRef
12.
go back to reference Ariffin, K. A. Z., & Ahmad, F. H. (2021). Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4 0. Computers & Security, 105, 102237.CrossRef Ariffin, K. A. Z., & Ahmad, F. H. (2021). Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4 0. Computers & Security, 105, 102237.CrossRef
19.
go back to reference Wang, H., Yang, G., Chinprutthiwong, P., Xu, L., Zhang, Y. & Gu, G. (2018). Towards fine-grained network security forensics and diagnosis in the SDN era. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16. doi: https://doi.org/10.1145/3243734.3243749 Wang, H., Yang, G., Chinprutthiwong, P., Xu, L., Zhang, Y. & Gu, G. (2018). Towards fine-grained network security forensics and diagnosis in the SDN era. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 3–16. doi: https://​doi.​org/​10.​1145/​3243734.​3243749
24.
go back to reference Domingues, P. & Rosário, A.F. (2019). Deep Learning-based Facial Detection and Recognition in Still Images for Digital Forensics. In ARES’19: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1–10. https://doi.org/10.1145/3339252.3340107 Domingues, P. & Rosário, A.F. (2019). Deep Learning-based Facial Detection and Recognition in Still Images for Digital Forensics. In ARES’19: Proceedings of the 14th International Conference on Availability, Reliability and Security, pp. 1–10. https://​doi.​org/​10.​1145/​3339252.​3340107
27.
29.
go back to reference Hossain, M. R., & Hoque, M. M. (2019). Automatic Bengali Document Categorization Based on Deep Convolution Nets. In N. Shetty, L. Patnaik, H. Nagaraj, P. Hamsavath & N. Nalini (Eds.), Emerging Research in Computing, Information, Communication and Applications. Advances in Intelligent Systems and Computing. Singapore: Springer. https://doi.org/10.1007/978-981-13-5953-8_43 Hossain, M. R., & Hoque, M. M. (2019). Automatic Bengali Document Categorization Based on Deep Convolution Nets. In N. Shetty, L. Patnaik, H. Nagaraj, P. Hamsavath & N. Nalini (Eds.), Emerging Research in Computing, Information, Communication and Applications. Advances in Intelligent Systems and Computing. Singapore: Springer. https://​doi.​org/​10.​1007/​978-981-13-5953-8_​43
30.
go back to reference Islam, M., Mahmood, A. N., Watters, P., & Alazab, M. (2019). Forensic Detection of Child Exploitation Material Using Deep Learning. In M. Alazab, & M. Tang (Eds.), Deep Learning Applications for Cyber Security. Advanced Sciences and Technologies for Security Applications. Cham: Springer. https://doi.org/10.1007/978-3-030-13057-2_10 Islam, M., Mahmood, A. N., Watters, P., & Alazab, M. (2019). Forensic Detection of Child Exploitation Material Using Deep Learning. In M. Alazab, & M. Tang (Eds.), Deep Learning Applications for Cyber Security. Advanced Sciences and Technologies for Security Applications. Cham: Springer. https://​doi.​org/​10.​1007/​978-3-030-13057-2_​10
31.
go back to reference Agrawal, P., & Trivedi, B. (2021). Machine Learning Classifiers for Android Malware Detection. In N. Sharma, A. Chakrabarti, V. Balas, & J. Martinovic (Eds.), Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing (Vol. 1174). Singapore: Springer. https://doi.org/10.1007/978-981-15-5616-6_22 Agrawal, P., & Trivedi, B. (2021). Machine Learning Classifiers for Android Malware Detection. In N. Sharma, A. Chakrabarti, V. Balas, & J. Martinovic (Eds.), Data Management, Analytics and Innovation. Advances in Intelligent Systems and Computing (Vol. 1174). Singapore: Springer. https://​doi.​org/​10.​1007/​978-981-15-5616-6_​22
Metadata
Title
Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics
Authors
Sonam Bhardwaj
Mayank Dave
Publication date
25-08-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2022
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-09026-6

Other articles of this Issue 3/2022

Wireless Personal Communications 3/2022 Go to the issue