Malware Detection Using Yara Rules in SIEM

Author:

Patel Priyam Subhash1,Kunwar Rakesh Singh1,Thakar Akash1

Affiliation:

1. Rashtriya Raksha University, India

Abstract

In this cyber world, working from the office to the home, security has never been more challenging. To detect attacks on the host computers and prevent further malicious activities, host intrusion detection systems (HIDS) are often used. Use of open-source SEIM tool Wazuh for monitoring and combines with YARA for file analysis. YARA rules are like those of a programming language that operates by specifying variables that indicate patterns identified in malware, depending on the rule. If any or all the conditions are satisfied, it can be used to effectively identify at least a portion of malware that defines variable parameters. YARA rules help SIEM operators analyse the file tag for malware detection before using it to its full potential. In this chapter, we are going to learn and implement malware analysis using Wazuh, and YARA rules before infecting the system fully. A flexible and effective method for detecting malware in system logs, network traffic, and other data sources is produced by combining WAZUH and YARA rules. By utilising the advantages of YARA rules and the sophisticated features of WAZUH, security teams can quickly identify malware attacks and respond to them. This lessens the effect on their business. A modern cybersecurity strategy must contain WAZUH SIEM and YARA rules. With YARA rules, security teams may spot malware attacks in WAZUH and take appropriate action to maintain the security and integrity of their organization's data and systems.

Publisher

IGI Global

Reference5 articles.

1. The Making of Indicator of Compromise using Malware Reverse Engineering Techniques

2. Bace & Mell. (2001). Intrusion Detection Systems. NIST Special Publication on Intrusion Detection Systems.

3. Gómez Vidal, A. S. (2019). Improvements in IDS: adding functionality to Wazuh. Academic Press.

4. Stanković, S., Gajin, S., & Petrović, R. (n.d.). A Review of Wazuh Tool Capabilities for Detecting Attacks Based on Log Analysis. Academic Press.

5. Wazuh. (2023). https://documentation.wazuh.com/current/index.html

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3