Fusion of Malware and Weapons Taxonomies for Analysis
ABSTRACT
This theoretical research uses forensic practices to support a likely resultant taxonomy for weaponized malware. Current malware taxonomies focus on behaviours, generations, and targets as part of their definitions. Naming and generational coding are often inherent in the taxonomical definition of a malware variant. In considering malware that may be weaponized, two core questions need to be answered. What makes a particular piece of malware a weapon, and is there such a thing? This research answers both questions and attempts to structure taxonomy. In this research, taxonomies of malware and weapons are considered for fusion in such a way as a taxonomical derivation will allow for discussion and evaluation of possible malware targets.
AUTHORS
College of Technology Purdue University,
United States
Sydney Lyles is a PhD candidate at Purdue University College of Technology. Her research interests focus on the culture of the commons of the forensics open source software development community. She is also a civilian employee with the U.S Army Corp of Engineers Computer Incident Response Team.
College of TechnologyPurdue University,
United States
Erin Poremski is a graduate student at the Cyber Forensics Laboratory at Purdue University. She holds a bachelor’s degree from Purdue University in Pre-medical Interdisciplinary Biological and Forensic Sciences.
College of Technology, Purdue University,
United States
Dr. Samuel Liles is an associate professor in the Purdue University Cyber Forensics Laboratory where he teaches cyber forensics, and transnational cyber-crime and conflict courses. Previously he was a professor in the Information Resources Management College at the National Defense where he taught courses in cyber conflict, information security, and enterprise risk management.
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive