Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Patterns of malware and digital attacks: A guideline for the security enthusiast
2018 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesisAlternative title
Patterns of malware and digital attacks : A guideline for the security enthusiast (English)
Abstract [en]

Context: In today’s era, many things are dependent on the internet thus the devices and

applications that are using it proliferates. Every day, many devices are

getting targeted by malevolent virus authors. To protect the data from malicious

factors becomes a preposterous dispute. A ransomware named CryptoLocker has caused

many individuals, hospitals, and institutions thousands if not millions of dollars in damage due to encrypting the computer files thus demanding a ransom in return. Once the ransomware strikes a system, the recoverability is almost non-existent if no backup or system restore is present due to the private key which was used to encrypt files is encrypted and sent to the attacker’s database. Without the key, there is no recovery for restoring files.

Objective: Exploratory research is conducted to reveal unique methods ransomware and keylogger may use to strike a system. The goal is to disclose protection policies of the Windows systems for the security enthusiasts and computer users. Three main objectives are present; how viruses hide in a system without servicing any rootkits to hide the malware, how ransomware and keylogger can be used together to deliver damage, and how to covert CPU usage of the ransomware during the encryption routine.

Method: To answer the questions and exploit new features, ransomware, keylogger and a trojan horse is built. Original CryptoLocker architecture has been analyzed, and some methods have been derived. The final application is running on the Windows operating system; Windows 10. Win32 API, C++, and C# are used for the construction of the malware programs. Visual Studio 2017 has been used as an IDE.

Results: The testing results reveal that running encryption routine as a background thread covert the CPU usage except the operation time increases by five times. The experiments show that disguising a malware program among the task manager process list is possible by setting Win32 API flag within the execution of the program. Changing the malware name, signature, and description of the program further enhance the sustainability rate from the everyday users.

Place, publisher, year, edition, pages
2018. , p. 22
Keywords [en]
malware, ransomware, keylogger, virus, antivirus, encryption, infection, protection, user guideline, digital attack
National Category
Software Engineering
Identifiers
URN: urn:nbn:se:bth-16313OAI: oai:DiVA.org:bth-16313DiVA, id: diva2:1214154
Subject / course
PA1445 Kandidatkurs i Programvaruteknik
Educational program
PAGIP International Software Engineering
Presentation
2018-05-30, Blekinge Tekniska Högskola, Valhallavägen 1, 371 41 Karlskrona, Karlskrona, 15:00 (English)
Supervisors
Examiners
Available from: 2018-06-11 Created: 2018-06-05 Last updated: 2018-06-11Bibliographically approved

Open Access in DiVA

BTH2018Güven(674 kB)2 downloads
File information
File name FULLTEXT02.pdfFile size 674 kBChecksum SHA-512
62320ff9372aeca2b8b41ddf378cead1c176926ca6402dfe1b6b9142081074f37a09c0f446d8352ede6c36f47b5b59672605722830a5c4189198f25d7cac4235
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Güven, Volkan
Software Engineering

Search outside of DiVA

GoogleGoogle Scholar
Total: 2 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 10 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf