Reverse Engineering and Automated Defense Strategies for Detecting and Preventing Rat Malware
dc.contributor.author | Linda Bsharat | |
dc.contributor.author | Lara Shahrori | |
dc.contributor.author | Lana Khdair | |
dc.date.accessioned | 2025-02-04T06:38:13Z | |
dc.date.available | 2025-02-04T06:38:13Z | |
dc.date.issued | 2025-02-03 | |
dc.description.abstract | This research presents a multi-faceted approach to detecting and preventing Remote Access Trojan (RAT) malware using reverse engineering and automated defense mechanisms. The study employs static and dynamic analysis techniques to deconstruct RAT malware, revealing its structure, persistence mechanisms, and command-and-control (C2) communication. Advanced cybersecurity tools such as Wireshark, Process Monitor, and Regshot are utilized to analyze system modifications and network traffic. To enhance real-time detection, automated analysis through APIs like VirusTotal is integrated, enabling the extraction of malicious indicators. Custom Snort intrusion detection system (IDS) rules are generated and deployed dynamically within a pfSense firewall, ensuring active blocking of RAT-related network traffic. This approach demonstrates the effectiveness of combining manual expertise with automation in fortifying network security. The study's methodology provides a scalable defense strategy against evolving malware threats, with potential applications in broader cybersecurity frameworks. | |
dc.identifier.uri | https://hdl.handle.net/20.500.11888/19877 | |
dc.language.iso | en | |
dc.supervisor | Ahmed Awad | |
dc.title | Reverse Engineering and Automated Defense Strategies for Detecting and Preventing Rat Malware | |
dc.type | Graduation Project |
Files
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: