Malware Analysis & its Application to Digital Forensic

Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 4

Abstract

In this paper we present study about how to analyze the malware on the system for digital investigation and also give the superficial knowledge and comparison about forensic model. This paper proposes a plan for achieving a dramatic improvement in research and operational efficiency through the adoption of systematic approaches for representing forensic data and performing forensic computation. This paper describes the nature of Forensic Science. Here we introduce malware analysis tools. Furthermore we also described malware analysis for digital forensic investigation.

Authors and Affiliations

Gursimran Kaur , Bharti Nagpal

Keywords

Related Articles

COMPARATIVE STUDY OF BROWSER BASED OPEN SOURCE TESTING TOOLS WATIR AND WET

Recently, web browser based applications have become very popular in many domains. As an important method to ensure the quality of Web applications, Web testing attracts more and more attentions in the academic community...

A Simplified Methodology for Random Topology Generator builds in Ad Hoc Network Test Bed

Emulation that uses iptables commands to create a desired logical topology is a technique that has been widely used in laboratory environments. The iptables commands are input directives for the iptables packetfiltering...

Localization of Mobile Nodes in Wireless Networks with Correlated in Time Measurement Noise

Wireless Sensor Networks (WSNs) are widely used in applications like location monitoring, object tracking and decision making systems. Movement patterns of mobile sensor nodes play an important role in such systems. This...

Determination of Angry Condition based on EEG, Speech and Heartbeat

This paper determines the angry emotion condition by analyzing and recognizing speech signal, EEG signal, as well as detecting the heartbeat. For the speech analyzing experiment, several digital signal processing methods...

Controller Design Based on ISE Minimization and Dominant Pole Retention Method

A computer based method to reduce the complexity of the higher order controller, based on the minimization of integral square error (ISE) and Dominant Pole Retention method pertaining to unit step input is presented in...

Download PDF file
  • EP ID EP92631
  • DOI -
  • Views 147
  • Downloads 0

How To Cite

Gursimran Kaur, Bharti Nagpal (2012). Malware Analysis & its Application to Digital Forensic. International Journal on Computer Science and Engineering, 4(4), 622-626. https://europub.co.uk/articles/-A-92631