logo

Paper on Study of VirusBattle

5 Pages1594 Words423 Views
   

Added on  2019-10-08

Paper on Study of VirusBattle

   Added on 2019-10-08

ShareRelated Documents
VirusBattle: State-of-the-Art Malware Analysis for Better Cyber Threat IntelligenceName of the student:Name of the University:Author note:
Paper on Study of VirusBattle_1
1Introduction:This paper is aimed to provide a critique to the chosen study “VirusBattle: State-of-the-ArtMalware Analysis for Better Cyber Threat Intelligence”, which aims to develop such systemthat discover interrelationships among instances of malware utilising state-of-the-art malwareanalysis. Through this paper research problem will explained and how the finding can beutilised in other application will be explained. Through providing critique to the chosenstudy, research gap will highlighted and conclusion will be drawn based upon its findingsfrom the analysis.Research question(s): Primary research question: Present study was to determine how VirusBattle with the first-class in elegance malware research framework can discover malware interrelationships?Secondary research question: Besides the primary research question, present study was aimed to trace how StaticFuncTracker investigation gives VirusBattle actual favourable occasions. Moreover, it was also aimed to trace how probabilistic hashes of the semantichighlights can enable the VirusBattle to trace malware interrelationHypotheses:As per the chosen study, VirusBattle is one of the under developing program and researchersare still working on the same to fulfil their aims. Thus, the study has not showcased anyhypothesis in it. Description of dataset:VirusBattle analyses mine malware interrelationships traced their useful data over manytypes of malware artefacts. It includes the binary, code, code semantics, dynamic behaviours,malware metadata, distribution sites and e-mails.Research problem:Picked reflect on consideration on exhibit that the virtual threat knowledge and investigationmarket it is growing quickly. It has likewise featured the way that devices like PalantirGotham and IBM i2 are utilized by perception examiners and virtual risk protectorscontinually to help in the extraction of good sized understanding from big recordsaccumulations contained statistics received from numerous unique resources. this isaccomplished through encouraging the revelation of concealed interrelationships amongdigital historical rarities, for example, components from prepared gadget logs, intermediaryand IDS frameworks, VPN, opposed to infection, DLP, DNS questions, and alertness logs;and from logical records, similar to e mail, print logs, workplace get to logs, internal talk
Paper on Study of VirusBattle_2

End of preview

Want to access all the pages? Upload your documents or become a member.