An Efficient Approach of Threat Hunting Using Memory Forensics

Danish Javeed,Muhammad Taimoor Khan,Ijaz Ahmad,Tahir Iqbal,Umar Mohammed Badamasi,Cosmas Obiora Ndubuisi,Aliyu Umar
DOI: https://doi.org/10.47277/ijcncs/8(5)1
2020-05-31
International Journal of Computer Networks and Communications Security
Abstract:The capacity and occurrence of new cyber-attacks have shattered in recent years. Such measures have very complicated workflows and comprise multiple illegal actors and organizations. Threat hunting demonstrates the process of proactively searching through networks for threats based on zero-day attacks by repeating the hunting process again and again. Unlike threat intelligence, it uses different automated security tools to collect logs in order to provide a pattern for making new intelligence-based tools by following those logs. According to our research findings about “threat hunting tools” there’s a major flaw that the designed tools are limited to the collection of logs. It works completely on logs for generating new patterns avoiding system’s main memory. Codes written directly to memory fail this process to provide proactive hunting. To overcome this major challenge, we are proposing two distinct methods, either by generating malicious code alerts or by binding memory forensics processes with threat hunting tools to make active hunting possible
What problem does this paper attempt to address?