A study on the live forensic techniques for anomaly detection in user terminals

Ae Chan Kim, Won Hyung Park, Dong Hoon Lee

    Research output: Contribution to journalArticlepeer-review

    12 Citations (Scopus)

    Abstract

    Digital forensics techniques that have been used to analyze system intrusion incidents traditionally are used to detect anomaly behavior that may occur in the user terminal environment. Particularly, for the method to analyze user terminals, automated live forensics techniques that are used as supporting tool for malicious code (malware) detection. We suggest a way to take advantage of the live forensic techniques for the anomaly detection of malware.

    Original languageEnglish
    Pages (from-to)181-188
    Number of pages8
    JournalInternational Journal of Security and its Applications
    Volume7
    Issue number1
    Publication statusPublished - 2013

    Keywords

    • Anomaly detection
    • Live forensics
    • Malware
    • User terminals

    ASJC Scopus subject areas

    • General Computer Science

    Fingerprint

    Dive into the research topics of 'A study on the live forensic techniques for anomaly detection in user terminals'. Together they form a unique fingerprint.

    Cite this