Academic Journals Database
Disseminating quality controlled scientific knowledge

Forensic investigation of trojan defense in virtual environment

ADD TO MY LIST
 
Author(s): Gojko Grubor | Nebojša Ivaniš

Journal: Singidunum Journal of Applied Sciences
ISSN 2217-8090

Volume: 9;
Issue: 2;
Start page: 14;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: malwere | trojan | trojan defense | cloud computing | virtual machines

ABSTRACT
This paper presents an example of a malware attack on a virtual computer. Human factor and social engineering techniques are believed to play a major role in malware attacks. Insufficient education of the user regarding the information safety facilitates further action of the attacker. The attacker writes the malware code if necessary - as a key logger, downloader, etc. Every attack includes good preparation, port scanning, collecting information about antivirus software and target computer usage, considering the scenario of the attack, and choosing the best timing and method of the attack. The paper discusses anti-forensic role of Trojans in a corrupt virtual computer from which the abuse was committed, without the owner’s knowledge. Furthermore, the paper provides more information about the experimental verification of forensic activities aimed to prove the so called “Trojan Defense” in virtual environments.
Why do you need a reservation system?      Affiliate Program