A YARA-based approach for detecting cyber security attack types

Abstract

Technological advancements have recently propelled individuals, institutions, and organizations to conduct their business processes on information systems. However, keeping personal and corporate data on information systems has given rise to issues related to data security. The accessibility of data on information systems has made it vulnerable to theft and exploitation by malicious groups or individuals, thus posing a significant risk to data security. Consequently, the demand for data security has led to a new business sector offering various cybersecurity solutions to protect organizations' systems. This paper presents an analysis of the prevalent types of cyber attacks worldwide. The study aims to create a virtual environment with Windows and Linux systems in Forensic Informatics and Incident Response processes to apply frequently used cyber attack methods, develop defense mechanisms against these methods, and contribute to revealing the root cause by solving the incident pattern. Furthermore, this application demonstrates how manual techniques and open-source solutions, such as YARA, can be used to detect malware derivatives commonly found in Windows systems.

Authors and Affiliations

Kubra YILDIRIM, Mustafa Emre DEMIR, Tugce KELES, Arif Metahan YILDIZ, Sengul DOGAN, Turker TUNCER

Keywords

Related Articles

Deep deterministic policy gradient reinforcement learning for collision-free navigation of mobile robots in unknown environments

Learning how to navigate in unfamiliar environments is a critical skill for AI-powered mobile robots. Traditional methods for robot navigation typically involve three key steps: positioning, mapping, and route planning....

Effect of layer number on bending behavior of 3D spacer composite plates produced with different methods

In this study, the three-point bending behavior of laminated composite plates reinforced with three-dimensional (3D) spacer fabric was experimentally investigated. Composite plate production was carried out using hand l...

Numerical determination of the production rate and cumulative production in the constant pressure outer boundary condition

The flow regime is identified as a steady-state flow if the pressure at every location in the reservoir remains constant. In this work, we have determined the well production rate and cumulative production in a circular...

Investigation of some thermophysical properties of Asphodelus aestivus reinforced polyester composite

In this research, both environmentally friendly and economical composites have been produced by using biomass wastes in unsaturated polyester. The use of renewable biomass wastes as a filler in unsaturated polyester is r...

A novel design for concrete culverts absorbing explosive energy from homemade explosives

With the increasing number of terrorist attacks for the last 40 years, terrorist organizations have devised various attack tactics. One of these tactics is to attack by placing homemade explosives inside culverts that ar...

Download PDF file
  • EP ID EP718141
  • DOI 10.5505/fujece.2023.09709
  • Views 79
  • Downloads 0

How To Cite

Kubra YILDIRIM, Mustafa Emre DEMIR, Tugce KELES, Arif Metahan YILDIZ, Sengul DOGAN, Turker TUNCER (2023). A YARA-based approach for detecting cyber security attack types. Firat University Journal of Experimental and Computational Engineering, 2(2), -. https://europub.co.uk/articles/-A-718141