Malware Attacks for Electronic Espionage

ABOUT ME

Dr. ILKER KARA has been an Assist. Prof. since 2019. He has also been a part-time Lecturer in the Computer Science and Engineering Department at Hacettepethe University, where he has been a faculty member since 2017. Dr. Kara completed his Ph.D. at Gazi University, 2015. His research interests include the fields of digital investigation, malware analysis and internet security. He has collaborated actively with researchers in several other disciplines such as computer science and , particularly forensic security from 2001. He is currently working as the Head of Information Security Division at the Informatics Institute. Besides, Dr. Kara is the author /co-author of more than 20 technical publications focusing on the applications of Cyber Security, Malware Analysis and Data Security Mechanisms.


MALWARE DATASET

I added an online website to study, which contains both the case samples for designed malware and a dataset for malware (belonging to 11 different malware families) that can be used in different studies for users to identify and analyze malware. I cooperated with an information security company active in this field in Turkey to create the necessary dataset.

You can access the online tools and download the programs needed for static analysis from the below links.



Note: Our data set is educational so you can request it by clicking the button below.

IMAJ COPY

In the field of forensic informatics, all investigations and analyses should be made on the copy (image) of the evidence in order not to cause any change in the original. Special hardware or software are needed for creating the image. The image creation process refers to copying all the files in the system (computer, mobile phone, portable memory, etc.) via a device or program. The Image includes all currently available data, deleted data, hidden partitions, and all other data contained in the data storage medium. In the image, it is mandatory to verify that all data in the evidence is replicated in full. For this reason, the image creation process should comply with international standards.

You can access the online tools and download the programs needed for static analysis from the below links.



STATIC ANALYSYS

Static analysis includes structural analysis of malware before its execution. Thanks of the static analysis, it is possible to obtain information on malware such as the texts contained, functions used, file-directory structure content and whether they are compressed, hash verification values, and its activation date in the system


You can access the online tools and download the programs needed for static analysis from the below links.






DYNAMIC ANALYSIS

Dynamic analysis includes running malicious software in a controlled area to control malware's file-directory, registry, operating system, IP traffic and network activities. Dynamic analysis allows to see the characteristics, mobility, activity and capacity of the malware.


You can access the online tools and download the programs needed for static analysis from the below links.








HYBRID (AUTOMATED) ANALYSYS

Systems are based on the machine learning principle. An automatic analysis system reports the network behaviors and general characteristics of the applications that are likely to contain malicious content by running them in a controlled environment.


You can access the online tools and download the programs needed for static analysis from the below links.






Malware Statistics

Malware Threat Report: Q2 2020 Statistics and Trends.
Increase Rate - September 2020 by Avira Protection Labs

Other sources for malware statistics.

CONTACT INFO

VISIT ME

MAIL ME

karaikab [at] gmail.com

CALL ME

+(90) 3764443332 - 5102

WORK HOUR

Mon - Sat: 10 Am - 17 Pm

I like to get in touch!