Araştırma Makalesi
PDF BibTex RIS Kaynak Göster

A YARA-based approach for detecting cyber security attack types

Yıl 2023, Cilt: 2 Sayı: 2, 55 - 68, 14.06.2023
https://doi.org/10.5505/fujece.2023.09709

Öz

Technological advancements have recently propelled individuals, institutions, and organizations to conduct their business processes on
information systems. However, keeping personal and corporate data on information systems has given rise to issues related to data
security. The accessibility of data on information systems has made it vulnerable to theft and exploitation by malicious groups or
individuals, thus posing a significant risk to data security. Consequently, the demand for data security has led to a new business sector
offering various cybersecurity solutions to protect organizations' systems. This paper presents an analysis of the prevalent types of cyber
attacks worldwide. The study aims to create a virtual environment with Windows and Linux systems in Forensic Informatics and
Incident Response processes to apply frequently used cyber attack methods, develop defense mechanisms against these methods, and
contribute to revealing the root cause by solving the incident pattern. Furthermore, this application demonstrates how manual techniques
and open-source solutions, such as YARA, can be used to detect malware derivatives commonly found in Windows systems.

Kaynakça

  • [1] Abomhara M, Køien GM. "Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks". Journal of Cyber Security and Mobility, 65–88, 2015.
  • [2] Eggers S. "A novel approach for analyzing the nuclear supply chain cyber-attack surface". Nuclear Engineering and Technology, 53(3), 879-887, 2021.
  • [3] Freilin FC, Holz T Wicherski G. "Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks". Computer Security–ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings 10, 2005: Springer, 319-335.
  • [4] Auty M. "Anatomy of an advanced persistent threat". Network Security, 4, 13-16, 2015.
  • [5] Ahmad A, Webb J, Desouza KC, Boorman J. "Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack". Computers & Security, 86, 402-418, 2019.
  • [6] Schneier B. "The future of incident response". IEEE Security & Privacy, 12(5), 96-96, 2014.
  • [7] Bhatt P, Yano ET, Gustavsson P. "Towards a framework to detect multi-stage advanced persistent threats attacks". in 2014 IEEE 8th international symposium on service oriented system engineering, IEEE, 390-395, 2014.
  • [8] Itodo C, Varlioglu S, Elsayed N. "Digital forensics and incident response (DFIR) challenges in IoT platforms". 4th International Conference on Information and Computer Technologies (ICICT), IEEE, 199-203, 2021.
  • [9] Johansen G. Digital forensics and incident response. Packt Publishing Ltd, 2017.
  • [10] Kim S, Kim J, S, Kim D. "WebMon: ML-and YARA-based malicious webpage detection". Computer Networks, 137, 119-131, 2018.
  • [11] Kumar MS, Ben-Othman J, Srinivasagan K. "An investigation on wannacry ransomware and its detection". in 2018 IEEE Symposium on Computers and Communications (ISCC), IEEE,1-6, 2018.
  • [12] Rosyid NR, Murti BB, Prayudha B, Ramadloni AF, Subekti L. "Malware Detection on local network based on honeypot and Yara". Sistemasi: Jurnal Sistem Informasi, 12(1), 186-193, 2023.
  • [13] Siddabathula KS, Panneerselvam RK, Vasana V, Vejendla J, Rafi M, Gummadi SB. "YaraCapper–YARA rule-based automated system to detect and alert network attacks". in Research Advances in Network Technologies: CRC Press, 25-47.
  • [14] Si Q. et al., "Malware detection using automated generation of yara rules on dynamic features". in Science of Cyber Security: 4th International Conference, SciSec 2022,Matsue, Japan, August 10–12, 2022, Revised Selected Papers, Springer, 315-330, 2022.
  • [15] Naik N, Jenkins P, Savage N, Yang L, Naik K, Song J. "Embedding fuzzy rules with YARA rules for performance optimisation of malware analysis". in 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, 1-7, 2022.
  • [16] Khalid M, Ismail M, Hussain M, Durad MH. "Automatic yara rule generation". in 2020 International Conference on Cyber Warfare and Security (ICCWS), IEEE, 1-5, 2020.
  • [17] Xu L, Qiao M. "Yara rule enhancement using Bert-based strings language model". in 2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE), IEEE, 221-224, 2022.
  • [18] Naik N. et al., "Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis". Complex & Intelligent Systems, 7, 687-702, 2021.
  • [19] Naik N, Jenkins P, Cooke R, Gillet J, Jin Y. "Evaluating automatically generated YARA rules and enhancing their effectiveness," in 2020 IEEE Symposium Series on Computational Intelligence (SSCI), IEEE, 1146-1153, 2020.
  • [20] Raff E. et al., "Automatic YARA rule generation using biclustering". in Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 71-82, 2020.
  • [21] Bilstein D, Plohmann D. "YARA-signator: automated generation of code-based YARA rules". J. Cybercrime Digit. Invest., 5(1), 1-13, 2019.
  • [22] Nguyen NH, Le VH, Phung VO, Du PH. "Toward a deep learning approach for detecting php webshell". in Proceedings of the 10th International Symposium on Information and Communication Technology, 514-521, 2019.
  • [23] Yusof AR, Udzir NI, Selamat A. "Systematic literature review and taxonomy for DDoS attack detection and prediction". International Journal of Digital Enterprise Technology, 1(3), 292-315, 2019.
  • [24] Yin D, Zhang L, Yang K. "A DDoS attack detection and mitigation with software-defined Internet of Things framework". IEEE Access, 6, 24694-24705, 2018.
  • [25] Joshi B, Vijayan AS, Joshi BK. "Securing cloud computing environment against DDoS attacks". in 2012 International Conference on Computer Communication and Informatics, IEEE, 1-5, 2012.
  • [26] Chiew KL, Yong KSC, Tan CL. "A survey of phishing attacks: Their types, vectors and technical approaches". Expert Systems with Applications, 106, 1-20, 2018.
  • [27] Tandale KD, Pawar SN. "Different types of phishing attacks and detection techniques: A review". in 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC), IEEE, 295-299, 2020.
  • [28] Le Page S, Jourdan GV, Bochmann GV, J Flood, Onut IV. "Using url shorteners to compare phishing and malware attacks". in 2018 APWG Symposium on Electronic Crime Research (eCrime), IEEE, 1-13, 2018.
  • [29] Pirscoveanu RS, Hansen SS, Larsen TM, Stevanovic M, Pedersen JM, Czech A. "Analysis of malware behavior: Type classification using machine learning." in 2015 International conference on cyber situational awareness, data analytics and assessment (CyberSA), IEEE, 1-7, 2015.
  • [30] Blaise A, Bouet M, Conan V, Secci S. "Detection of zero-day attacks: An unsupervised port-based approach". Computer Networks, 180, 107391, 2020.
  • [31] Kim JY, Bu SJ, Cho SB. "Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders". Information Sciences, 460, 83-102, 2018.
  • [32] Conti M, Dragoni N, Lesyk V. "A survey of man in the middle attacks". IEEE communications surveys & tutorials, 18(3), 2027-2051, 2016.
  • [33] Tommasi F, Catalano C, Taurino I. "Browser-in-the-Middle (BitM) attack". International Journal of Information Security, 21(2), 179-189, 2022.
  • [34] Alberto O, Marco V. "Man in the middle attacks". in Blackhat Conference Europe, 2003.
  • [35] Lee J, Lee S. "A study on unknown malware detection using digital forensic techniques". Journal of The Korea Institute of Information Security & Cryptology, 24(1), 107-122, 2014.
  • [36] Bazrafshan Z, Hashemi H, Fard SMH, Hamzeh A. "A survey on heuristic malware detection techniques". in The 5th Conference on Information and Knowledge Technology, IEEE, pp. 113-120, 2015.
  • [37] Duby A, Taylor T, Zhuang Y. "Malware family classification via residual prefetch artifacts" .in 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), IEEE, 256-259, 2022.
  • [38] Naik N. et al., "Fuzzy hashing aided enhanced YARA rules for malware triaging". in 2020 IEEE Symposium Series on Computational Intelligence (SSCI), IEEE, 1138-1145, 2020.
  • [39] Culling C. "Which YARA rules rule: basic or advanced?". GIAC (GCIA) Gold Certification and RES, 5500, 2018.

Yıl 2023, Cilt: 2 Sayı: 2, 55 - 68, 14.06.2023
https://doi.org/10.5505/fujece.2023.09709

Öz

Kaynakça

  • [1] Abomhara M, Køien GM. "Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks". Journal of Cyber Security and Mobility, 65–88, 2015.
  • [2] Eggers S. "A novel approach for analyzing the nuclear supply chain cyber-attack surface". Nuclear Engineering and Technology, 53(3), 879-887, 2021.
  • [3] Freilin FC, Holz T Wicherski G. "Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks". Computer Security–ESORICS 2005: 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings 10, 2005: Springer, 319-335.
  • [4] Auty M. "Anatomy of an advanced persistent threat". Network Security, 4, 13-16, 2015.
  • [5] Ahmad A, Webb J, Desouza KC, Boorman J. "Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack". Computers & Security, 86, 402-418, 2019.
  • [6] Schneier B. "The future of incident response". IEEE Security & Privacy, 12(5), 96-96, 2014.
  • [7] Bhatt P, Yano ET, Gustavsson P. "Towards a framework to detect multi-stage advanced persistent threats attacks". in 2014 IEEE 8th international symposium on service oriented system engineering, IEEE, 390-395, 2014.
  • [8] Itodo C, Varlioglu S, Elsayed N. "Digital forensics and incident response (DFIR) challenges in IoT platforms". 4th International Conference on Information and Computer Technologies (ICICT), IEEE, 199-203, 2021.
  • [9] Johansen G. Digital forensics and incident response. Packt Publishing Ltd, 2017.
  • [10] Kim S, Kim J, S, Kim D. "WebMon: ML-and YARA-based malicious webpage detection". Computer Networks, 137, 119-131, 2018.
  • [11] Kumar MS, Ben-Othman J, Srinivasagan K. "An investigation on wannacry ransomware and its detection". in 2018 IEEE Symposium on Computers and Communications (ISCC), IEEE,1-6, 2018.
  • [12] Rosyid NR, Murti BB, Prayudha B, Ramadloni AF, Subekti L. "Malware Detection on local network based on honeypot and Yara". Sistemasi: Jurnal Sistem Informasi, 12(1), 186-193, 2023.
  • [13] Siddabathula KS, Panneerselvam RK, Vasana V, Vejendla J, Rafi M, Gummadi SB. "YaraCapper–YARA rule-based automated system to detect and alert network attacks". in Research Advances in Network Technologies: CRC Press, 25-47.
  • [14] Si Q. et al., "Malware detection using automated generation of yara rules on dynamic features". in Science of Cyber Security: 4th International Conference, SciSec 2022,Matsue, Japan, August 10–12, 2022, Revised Selected Papers, Springer, 315-330, 2022.
  • [15] Naik N, Jenkins P, Savage N, Yang L, Naik K, Song J. "Embedding fuzzy rules with YARA rules for performance optimisation of malware analysis". in 2020 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, 1-7, 2022.
  • [16] Khalid M, Ismail M, Hussain M, Durad MH. "Automatic yara rule generation". in 2020 International Conference on Cyber Warfare and Security (ICCWS), IEEE, 1-5, 2020.
  • [17] Xu L, Qiao M. "Yara rule enhancement using Bert-based strings language model". in 2022 5th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE), IEEE, 221-224, 2022.
  • [18] Naik N. et al., "Embedded YARA rules: strengthening YARA rules utilising fuzzy hashing and fuzzy rules for malware analysis". Complex & Intelligent Systems, 7, 687-702, 2021.
  • [19] Naik N, Jenkins P, Cooke R, Gillet J, Jin Y. "Evaluating automatically generated YARA rules and enhancing their effectiveness," in 2020 IEEE Symposium Series on Computational Intelligence (SSCI), IEEE, 1146-1153, 2020.
  • [20] Raff E. et al., "Automatic YARA rule generation using biclustering". in Proceedings of the 13th ACM Workshop on Artificial Intelligence and Security, 71-82, 2020.
  • [21] Bilstein D, Plohmann D. "YARA-signator: automated generation of code-based YARA rules". J. Cybercrime Digit. Invest., 5(1), 1-13, 2019.
  • [22] Nguyen NH, Le VH, Phung VO, Du PH. "Toward a deep learning approach for detecting php webshell". in Proceedings of the 10th International Symposium on Information and Communication Technology, 514-521, 2019.
  • [23] Yusof AR, Udzir NI, Selamat A. "Systematic literature review and taxonomy for DDoS attack detection and prediction". International Journal of Digital Enterprise Technology, 1(3), 292-315, 2019.
  • [24] Yin D, Zhang L, Yang K. "A DDoS attack detection and mitigation with software-defined Internet of Things framework". IEEE Access, 6, 24694-24705, 2018.
  • [25] Joshi B, Vijayan AS, Joshi BK. "Securing cloud computing environment against DDoS attacks". in 2012 International Conference on Computer Communication and Informatics, IEEE, 1-5, 2012.
  • [26] Chiew KL, Yong KSC, Tan CL. "A survey of phishing attacks: Their types, vectors and technical approaches". Expert Systems with Applications, 106, 1-20, 2018.
  • [27] Tandale KD, Pawar SN. "Different types of phishing attacks and detection techniques: A review". in 2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC), IEEE, 295-299, 2020.
  • [28] Le Page S, Jourdan GV, Bochmann GV, J Flood, Onut IV. "Using url shorteners to compare phishing and malware attacks". in 2018 APWG Symposium on Electronic Crime Research (eCrime), IEEE, 1-13, 2018.
  • [29] Pirscoveanu RS, Hansen SS, Larsen TM, Stevanovic M, Pedersen JM, Czech A. "Analysis of malware behavior: Type classification using machine learning." in 2015 International conference on cyber situational awareness, data analytics and assessment (CyberSA), IEEE, 1-7, 2015.
  • [30] Blaise A, Bouet M, Conan V, Secci S. "Detection of zero-day attacks: An unsupervised port-based approach". Computer Networks, 180, 107391, 2020.
  • [31] Kim JY, Bu SJ, Cho SB. "Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders". Information Sciences, 460, 83-102, 2018.
  • [32] Conti M, Dragoni N, Lesyk V. "A survey of man in the middle attacks". IEEE communications surveys & tutorials, 18(3), 2027-2051, 2016.
  • [33] Tommasi F, Catalano C, Taurino I. "Browser-in-the-Middle (BitM) attack". International Journal of Information Security, 21(2), 179-189, 2022.
  • [34] Alberto O, Marco V. "Man in the middle attacks". in Blackhat Conference Europe, 2003.
  • [35] Lee J, Lee S. "A study on unknown malware detection using digital forensic techniques". Journal of The Korea Institute of Information Security & Cryptology, 24(1), 107-122, 2014.
  • [36] Bazrafshan Z, Hashemi H, Fard SMH, Hamzeh A. "A survey on heuristic malware detection techniques". in The 5th Conference on Information and Knowledge Technology, IEEE, pp. 113-120, 2015.
  • [37] Duby A, Taylor T, Zhuang Y. "Malware family classification via residual prefetch artifacts" .in 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), IEEE, 256-259, 2022.
  • [38] Naik N. et al., "Fuzzy hashing aided enhanced YARA rules for malware triaging". in 2020 IEEE Symposium Series on Computational Intelligence (SSCI), IEEE, 1138-1145, 2020.
  • [39] Culling C. "Which YARA rules rule: basic or advanced?". GIAC (GCIA) Gold Certification and RES, 5500, 2018.

Ayrıntılar

Birincil Dil İngilizce
Konular Bilgisayar Yazılımı
Bölüm Research Articles
Yazarlar

Kubra Y ILDIRIM Bu kişi benim
FIRAT ÜNİVERSİTESİ
0000-0002-4738-2777
Türkiye


Mustafa Emre DEMIR Bu kişi benim
FIRAT ÜNİVERSİTESİ
0000-0002-8324-0127
Türkiye


Tugce KELES Bu kişi benim
FIRAT ÜNİVERSİTESİ
0000-0003-0131-2826
Türkiye


Arif Metahan YILDIZ Bu kişi benim
FIRAT ÜNİVERSİTESİ
0000-0003-0451-8600
Türkiye


Sengul DOGAN Bu kişi benim
FIRAT ÜNİVERSİTESİ
0000-0001-9677-5684
Türkiye


Turker TUNCER Bu kişi benim
FIRAT ÜNİVERSİTESİ
0000-0002-5126-6445
Türkiye

Yayımlanma Tarihi 14 Haziran 2023
Kabul Tarihi 10 Mayıs 2023
Yayınlandığı Sayı Yıl 2023 Cilt: 2 Sayı: 2

Kaynak Göster

Bibtex @araştırma makalesi { fujece1316612, journal = {Firat University Journal of Experimental and Computational Engineering}, eissn = {2822-2881}, address = {Fırat Üniversitesi Mühendislik Fakültesi Deneysel ve Hesaplamalı Mühendislik Dergisi Yayın Koordinatörlüğü 23119 Elazığ/TÜRKİYE}, publisher = {Fırat Üniversitesi}, year = {2023}, volume = {2}, number = {2}, pages = {55 - 68}, doi = {10.5505/fujece.2023.09709}, title = {A YARA-based approach for detecting cyber security attack types}, key = {cite}, author = {Ildırım, Kubra Y and Demır, Mustafa Emre and Keles, Tugce and Yıldız, Arif Metahan and Dogan, Sengul and Tuncer, Turker} }
APA Ildırım, K. Y. , Demır, M. E. , Keles, T. , Yıldız, A. M. , Dogan, S. & Tuncer, T. (2023). A YARA-based approach for detecting cyber security attack types . Firat University Journal of Experimental and Computational Engineering , 2 (2) , 55-68 . DOI: 10.5505/fujece.2023.09709
MLA Ildırım, K. Y. , Demır, M. E. , Keles, T. , Yıldız, A. M. , Dogan, S. , Tuncer, T. "A YARA-based approach for detecting cyber security attack types" . Firat University Journal of Experimental and Computational Engineering 2 (2023 ): 55-68 <https://dergipark.org.tr/tr/pub/fujece/issue/78053/1316612>
Chicago Ildırım, K. Y. , Demır, M. E. , Keles, T. , Yıldız, A. M. , Dogan, S. , Tuncer, T. "A YARA-based approach for detecting cyber security attack types". Firat University Journal of Experimental and Computational Engineering 2 (2023 ): 55-68
RIS TY - JOUR T1 - A YARA-based approach for detecting cyber security attack types AU - Kubra YIldırım, Mustafa EmreDemır, TugceKeles, Arif MetahanYıldız, SengulDogan, TurkerTuncer Y1 - 2023 PY - 2023 N1 - doi: 10.5505/fujece.2023.09709 DO - 10.5505/fujece.2023.09709 T2 - Firat University Journal of Experimental and Computational Engineering JF - Journal JO - JOR SP - 55 EP - 68 VL - 2 IS - 2 SN - -2822-2881 M3 - doi: 10.5505/fujece.2023.09709 UR - https://doi.org/10.5505/fujece.2023.09709 Y2 - 2023 ER -
EndNote %0 Firat University Journal of Experimental and Computational Engineering A YARA-based approach for detecting cyber security attack types %A Kubra Y Ildırım , Mustafa Emre Demır , Tugce Keles , Arif Metahan Yıldız , Sengul Dogan , Turker Tuncer %T A YARA-based approach for detecting cyber security attack types %D 2023 %J Firat University Journal of Experimental and Computational Engineering %P -2822-2881 %V 2 %N 2 %R doi: 10.5505/fujece.2023.09709 %U 10.5505/fujece.2023.09709
ISNAD Ildırım, Kubra Y , Demır, Mustafa Emre , Keles, Tugce , Yıldız, Arif Metahan , Dogan, Sengul , Tuncer, Turker . "A YARA-based approach for detecting cyber security attack types". Firat University Journal of Experimental and Computational Engineering 2 / 2 (Haziran 2023): 55-68 . https://doi.org/10.5505/fujece.2023.09709
AMA Ildırım K. Y. , Demır M. E. , Keles T. , Yıldız A. M. , Dogan S. , Tuncer T. A YARA-based approach for detecting cyber security attack types. FUJECE. 2023; 2(2): 55-68.
Vancouver Ildırım K. Y. , Demır M. E. , Keles T. , Yıldız A. M. , Dogan S. , Tuncer T. A YARA-based approach for detecting cyber security attack types. Firat University Journal of Experimental and Computational Engineering. 2023; 2(2): 55-68.
IEEE K. Y. Ildırım , M. E. Demır , T. Keles , A. M. Yıldız , S. Dogan ve T. Tuncer , "A YARA-based approach for detecting cyber security attack types", Firat University Journal of Experimental and Computational Engineering, c. 2, sayı. 2, ss. 55-68, Haz. 2023, doi:10.5505/fujece.2023.09709