Fusion of Malware and Weapons Taxonomies for Analysis

ABSTRACT

This theoretical research uses forensic practices to support a likely resultant taxonomy for weaponized malware. Current malware taxonomies focus on behaviours, generations, and targets as part of their definitions. Naming and generational coding are often inherent in the taxonomical definition of a malware variant. In considering malware that may be weaponized, two core questions need to be answered. What makes a particular piece of malware a weapon, and is there such a thing? This research answers both questions and attempts to structure taxonomy. In this research, taxonomies of malware and weapons are considered for fusion in such a way as a taxonomical derivation will allow for discussion and evaluation of possible malware targets.


AUTHORS

Photo of Sydney Lyles

College of Technology Purdue University,
United States

Sydney Lyles is a PhD candidate at Purdue University College of Technology. Her research interests focus on the culture of the commons of the forensics open source software development community. She is also a civilian employee with the U.S Army Corp of Engineers Computer Incident Response Team.

Photo of Erin Poremski

College of TechnologyPurdue University,
United States

Erin Poremski is a graduate student at the Cyber Forensics Laboratory at Purdue University. She holds a bachelor’s degree from Purdue University in Pre-medical Interdisciplinary Biological and Forensic Sciences.

photo of Dr. Samuel Liles

College of Technology, Purdue University,
United States

Dr. Samuel Liles is an associate professor in the Purdue University Cyber Forensics Laboratory where he teaches cyber forensics, and transnational cyber-crime and conflict courses. Previously he was a professor in the Information Resources Management College at the National Defense where he taught courses in cyber conflict, information security, and enterprise risk management.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com