Owing to the rapid increase of malicious activity over the internet, new forms of malware (i.e. malicious code) are developed roughly every other day. One of the relatively-newer types of malicious threats that exist over the internet are file-less malwares; that are fundamentally your typical malwa
Anti Ghost
Owing to the rapid increase of malicious activity over the internet, new forms of malware (i.e. malicious code) are developed roughly every other day. One of the relatively-newer types of malicious threats that exist over the internet are file-less malwares; that are fundamentally your typical malware, however, unlike most malware they do not have files stored on to the system or even require persistence (in some cases).
Anti-Ghost is aimed at the detection of the aforementioned malware. Previous studies with respect to the detection of File-less malware have been conducted by numerous researchers over the past few years, starting back in 2012. Anti-Ghost is aimed at the detection of the aforementioned malware. Previous studies with respect to the detection of File-less malware have been conducted by numerous researchers over the past few years, starting back in 2012. Said studies have been aimed at an understanding of what file-less malwares are, what attack vectors the category of malwares implement and how can they be prevented and detected before the damge is done. This project is similarly aimed at the detection of file-less malware based on behavioral analysis with primary focus towards a particular attack vector. Ultimately, we discuss the feasibility of a a tool for the analysis of malware in order to answer one question; “How do file-less malware behave and how can they be detected?”. These widely used solutions come with some critical shortcomings. A number of anti-malware programs exist that are aimed at prevention of malicious activity; however, we also observe that most of them are unable to detect malware of the file-less nature. In that respect, anti-ghost:
Therefore, a complete indigenous solution was required to counter this increasingly growing issue with highly resilient file-less malware. This intrigued us to come up with Anti-Ghost, an indigenous software solution that detects malicious activity based on file-less malware. It would help common users, government organizations, corporate sector and financial organizations to maintain their system’s security and prevent activity.
Anti-Ghost has the following aspects and capabilities:
The client, that requires security from malware, installs the Anti-Ghost software on his or her windows-based computer system. He then installs and activates it by entering the license key that is registered to his/her name, thus starting up anti-malware services on their devices.
The Anti-Ghost system runs automatically in the background which starts to monitor real-time system activity which includes system calls, file system activity, registry activity as well as API calls. This behavior is further checked against a set of pre-defined rules that are made against a machine learning model developed using a massive dataset that contains both malicious as well as benign file samples.
The aforementioned set of rules are generated using reports that have been generated using live malware samples, that helps ascertain whether or not the behavior displayed by the system is malicious. In that respect, each rule is assigned a severity indicator based on the amount of malicious activity. This malicious activity is guided by a threshold that dictates whether or not a process is malicious based on defining rules.
To develop an indigenous anti-malware solution, we've made use of:
Software
Hardware
Storage
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| GPU (GTX 1050ti) | Equipment | 1 | 25000 | 25000 |
| SSD (Samsung EVO 860) | Equipment | 2 | 9500 | 19000 |
| CPU (Ryzen 5 2600x) | Equipment | 1 | 25000 | 25000 |
| Printing of Anti-Ghost Shirts | Miscellaneous | 2 | 600 | 1200 |
| Printing of Standee | Miscellaneous | 1 | 800 | 800 |
| Memory Forensics Course (Online purchase through Udemy) | Miscellaneous | 1 | 2000 | 2000 |
| Brochures | Miscellaneous | 50 | 50 | 2500 |
| Contact Cards | Miscellaneous | 50 | 15 | 750 |
| Total in (Rs) | 76250 |
The name of the project is Force feedback side-stick for a training simulator. This side-s...
Android Based Smart door locking system is designed to prevent unauthorized access, trespa...
Misplaced or lost files are perhaps the most significant of all costs associated with reco...
In Pakistan, the generated power is not fulfilling the power in demand due to huge power s...
Attendance check plays an important role in classroom management. Checking attenda...