Exploring the Role of Advanced Shell Scripts for Malware Threat Detection

Year : 2024 | Volume : 11 | Issue : 03 | Page : 6-16
    By

    P. Devi Sravanthi,

  • Manas Kumar Yogi,

  1. Student, Department of Computer Science and Engineering, Pragati Engineering College (A), Surampalem, Andhra Pradesh, India
  2. Assistant Professor, Department of Computer Science and Engineering, Pragati Engineering College (A), Surampalem, Andhra Pradesh, India

Abstract

This study investigates the application of advanced shell scripts in detecting malware threats within computer systems. As cyber-attacks become more sophisticated, traditional detection methods frequently prove inadequate, highlighting the need for innovative approaches. The research highlights the effectiveness of shell scripting in automating the monitoring and analysis of system behavior, file integrity, and network traffic. By leveraging patterns and signatures of known malware, the scripts can identify anomalies indicative of malicious activities. The study also examines the use of machine learning techniques to improve detection accuracy and minimize false positives. The findings suggest that advanced shell scripts not only streamline the detection process but also empower system administrators with real-time insights into potential threats. Ultimately, this research contributes to the field of cyber security by providing a practical framework for utilizing shell scripts as a proactive defense mechanism against malware, fostering a more robust security posture in organizational environments.

Keywords: Malware, shell scripts, threat, cybersecurity, behavioral analysis

[This article belongs to Journal of Advances in Shell Programming ]

How to cite this article:
P. Devi Sravanthi, Manas Kumar Yogi. Exploring the Role of Advanced Shell Scripts for Malware Threat Detection. Journal of Advances in Shell Programming. 2024; 11(03):6-16.
How to cite this URL:
P. Devi Sravanthi, Manas Kumar Yogi. Exploring the Role of Advanced Shell Scripts for Malware Threat Detection. Journal of Advances in Shell Programming. 2024; 11(03):6-16. Available from: https://journals.stmjournals.com/joasp/article=2024/view=180758


References

  1. Sudhakar KS, Kumar S. An emerging threat fileless malware: A survey and research challenges. Cybersecurity. 2020;3(1):1. DOI: 10.1186/s42400-019-0043-x.
  2. Alasmary H, Anwar A, Abusnaina A, Alabduljabbar A, Abuhamad M, Wang A, et al. SHELLCORE: Automating malicious IoT software detection using shell commands representation. IEEE Internet of Things Journal. 2022;9:2485–96. DOI: 10.1109/JIOT.2021.3086398.
  3. Saha A, Blasco J, Lindorfer M. Exploring the malicious document threat landscape: Towards a systematic approach to detection and analysis. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). 2024;533–44. DOI: 10.1109/EuroSPW61312.2024.00065.
  4. Caviglione L, Choraś M, Corona I, Janicki A, Mazurczyk W, Pawlicki M, et al. Tight arms race: Overview of current malware threats and trends in their detection. IEEE Access. 2021;9:5371–96. DOI: 10.1109/ACCESS.2020.3048319.
  5. Barr-Smith F. Advances in detection and analysis of modern evasive malware [Doctoral dissertation]. Oxford: University of Oxford; 2023.
  6. Kara I. Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges. Expert Systems with Applications. 2023;214:119133. DOI: 10.1016/j.eswa.2022.119133.
  7. Poudyal S, Dasgupta D. AI-powered ransomware detection framework. IEEE Symposium Series on Computational Intelligence (SSCI). 2020;1154–61. DOI: 10.1109/SSCI47803.2020.9308387.
  8. Praveen MK. A Comparative Analysis of Malware Written in the C and Rust Programming Languages [Master’s thesis]. Rochester: Rochester Institute of Technology; 2023.
  9. Bhardwaj A, Kaushik K, Alomari A, Alsirhani A, Alshahrani MM, Bharany S. BTH: Behavior-based structured threat hunting framework to analyze and detect advanced adversaries. Electronics. 2022;11:2992. DOI: 10.3390/electronics11192992.
  10. Carrillo-Mondéjar J, Martínez JL, Suarez-Tangil G. Characterizing Linux-based malware: Findings and recent trends. Future Generation Computer Systems. 2020;110:267–81. DOI: 10.1016/j.future.2020.04.031.
  11. Babar FM. Emerging & unconventional malware detection using a hybrid approach [Master’s thesis]. Windsor: University of Windsor; 2020.
  12. Nguyen HN, Abri F, Pham V, Chatterjee M, Namin AS, Dang T. MalView: Interactive visual analytics for comprehending malware behavior. IEEE Access. 2022;10:99909–30. DOI: 10.1109/ACCESS.2022.3207782.
  13. Johansen MB. Development of a customized remote access trojan (RAT) for educational purposes within the field of malware analysis [Master’s thesis]. Trondheim: Norwegian University of Science and Technology; 2022.
  14. Wu MH, Hsu FH, Hunag JH, Wang K, Liu YY, Chen JX, et al. MPSD: A robust defense mechanism against malicious PowerShell scripts in Windows systems. Electronics. 2024;13:3717. DOI: 10.3390/electronics13183717.
  15. Kawasoe R, Han C, Isawa R, Takahashi T, Takeuchi J. Investigating behavioral differences between IoT malware via function call sequence graphs. In: Proceedings of the 36th Annual ACM Symposium on Applied Computing, SAC 2021. Association for Computing Machinery; 2021. p. 1674–82. (Proceedings of the ACM Symposium on Applied Computing). DOI: 10.1145/3412841.3442041.
  16. Suwais K, Hnaif AA, Almanasra S. An alternative static taint analysis framework to detect PHP web shell-based web attacks. Int J Adv Soft Compu Appl. 2023 Nov;15(3):117–31. DOI: 10.15849/IJASCA.231130.08.

Regular Issue Subscription Review Article
Volume 11
Issue 03
Received 22/10/2024
Accepted 29/10/2024
Published 04/11/2024


My IP

PlumX Metrics