Book

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data: An Excerpt from Malware Forensics Field Guide for Linux Systems

Authors:

Abstract

Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
... Therefore Linux OS are no more immune to the malware attacks. Over the years Linux features are more or less same, hence some rootkits that have been used decade back are still being used for the attacks, e.g. the Adore root kit, trojanized system binaries, SSH servers etc. [5]. ...
Chapter
Full-text available
In today’s world, Sahay, Sanjay K. is one of the most valuable assets, but there is a major threat to it by the evolving second-Sharma, Ashu sophisticated malware, because it can enter Rathore, Hemant networks, quietly take the confidential data/information from the computational devices, and can cripple the infrastructures, etc. To detect these malware, time-to-time various techniques are proposed. These methods range from the early day signature-based detection to machine/deep learning techniques. Therefore, to understand the evolution of malware and its detection technique, this paper presents an overview of the evolution of malware and it’s detection techniques. It discusses in details the various type of second-generation malware and the popular detection techniques used to detect it, viz. signature matching, heuristic methods, normalization, and machine/deep learning techniques.
... Therefore Linux OS are no more immune to the malware attacks. Over the years Linux features are more or less same, hence some rootkits that have been used decade back are still being used for the attacks, e.g. the Adore root kit, trojanized system binaries, SSH servers etc. [5]. ...
Research
Full-text available
Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc. To combat the threat/attacks from the malwares, anti- malwares have been developed. The existing anti-malwares are mostly based on the assumption that the malware structure does not changes appreciably. But the recent advancement in second generation malwares can create variants and hence posed a challenge to anti-malwares developers. To combat the threat/attacks from the second generation malwares with low false alarm we present our survey on malwares and its detection techniques.
... Therefore Linux OS are no more immune to the malware attacks. Over the years Linux features are more or less same, hence some rootkits that have been used decade back are still being used for the attacks, e.g. the Adore root kit, trojanized system binaries, SSH servers etc. [5]. ...
Article
Full-text available
Malwares are big threat to digital world and evolving with high complexity. It can penetrate networks, steal confidential information from computers, bring down servers and can cripple infrastructures etc. To combat the threat/attacks from the malwares, anti- malwares have been developed. The existing anti-malwares are mostly based on the assumption that the malware structure does not changes appreciably. But the recent advancement in second generation malwares can create variants and hence posed a challenge to anti-malwares developers. To combat the threat/attacks from the second generation malwares with low false alarm we present our survey on malwares and its detection techniques.
ResearchGate has not been able to resolve any references for this publication.