A preliminary study of the effects of a novice hacker's learning process on a computer hardware and base operating system component performance
MetadataShow full item record
SubjectResearch Subject Categories::TECHNOLOGY::Information technology::Computer science::Computer science
Computer crimes -- Prevention
Computer crimes -- Research
Computer networks -- Security measures
Malware (Computer software) -- Research
Hackers -- Research
AbstractOne of the major problems in computer security today is the mitigation of damage caused by malware. Common approaches for gathering information about this threat have been to investigate and utilize the structure of a malware attack for prevention and reduction of damage, or analysis of the effect of malware originally found in the wild on target computer systems. This thesis provides a means of determining whether or not sufficient information exists to examine the possibility of finding or identifying an inexperienced hacker inside of a computer system. Analysis of pseudo-ransomware inside a virtual machine was performed, with investigation into the performance of the system’s hardware and base operating system components. It was discovered that CPU load was the core of indicators that displayed the presence of possible ransomware, as it consistently displayed longer process completion times and signs of strain under intensified usage. Furthermore, this factor could be paired with statistics for other areas of the system in order to provide more detail about the attack itself.
The following license files are associated with this item:
Except where otherwise noted, this item's license is described as Attribution-NonCommercial-NoDerivs 3.0 United States
Showing items related by title, author, creator and subject.
Computer Science Track Renamed: Advanced Computing Track and Computer Science and Information (CSIS) Track Renamed: Software Development (SD) Track Unknown author (5/11/1998)Renaming computer science track to advanced computing and CSIS is renamed software development track
Knee, Michael (Haworth Press, 2006)Computing and computer science bibliographic databases, bibliographies, dictionaries, encyclopedias, directories, and guides, along with finding aids for technical reports, online books, and book reviews are listed and ...
Heuristic algorithms for optimizing computing and communication costs for networked computer utilities Zhang, Guodong; Rappaport, Stephen S. (Stony Brook, N.Y.: State University of New York at Stony Brook, College of Engineering., 1998)