Stealth Eye: Behavioral Analysis for Fileless Malware Detection
| dc.contributor.author | Bandara H.M.H.M | |
| dc.contributor.author | Ayeshani K.M.N | |
| dc.contributor.author | Kumari M.M.P.M | |
| dc.contributor.author | Wijerathna D.M.S.T | |
| dc.contributor.author | Abeywardena, K.Y | |
| dc.contributor.author | Wijesooriya, A | |
| dc.date.accessioned | 2026-03-18T10:22:25Z | |
| dc.date.issued | 2025 | |
| dc.description.abstract | Fileless malware is a significant cybersecurity threat as it is entirely present in system memory and evades traditional signature-based detection methods. This paper introduces STEALTH EYE, an endpoint behavioral analysis framework for detecting fileless malware, such as ransomware, spyware, trojans, and RedLine Stealer, in real time. The framework utilizes an endpoint agent that monitors system activity in real time and captures snapshots of behavior every 60 seconds for real- time threat analysis. These captures track memory injections, DLL loading and execution, file and handle operations, service activity, process and thread behavior, registry modifications, network communications, cryptographic function usage, keystroke logging, and clipboard access. The data that is collected is analyzed through supervised machine learning mechanisms to detect patterns that indicate fileless malware activity. In contrast to traditional post-infection forensic approaches, STEALTH EYE provides real-time monitoring, notification, and active response with enhanced cybersecurity resilience against the widespread fileless attacks. | |
| dc.identifier.doi | DOI: 10.1109/ISDFS65363.2025.11012086 | |
| dc.identifier.issn | 979-833150993-4 | |
| dc.identifier.uri | https://rda.sliit.lk/handle/123456789/4845 | |
| dc.language.iso | en | |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
| dc.relation.ispartofseries | ISDFS 2025 - 13th International Symposium on Digital Forensics and Security | |
| dc.subject | behavioral analysis | |
| dc.subject | endpoint agent | |
| dc.subject | Fileless malware | |
| dc.subject | ransomware | |
| dc.subject | real-time detection | |
| dc.subject | RedLine Stealer | |
| dc.subject | spyware | |
| dc.subject | supervised | |
| dc.title | Stealth Eye: Behavioral Analysis for Fileless Malware Detection | |
| dc.type | Article |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Stealth_Eye_Behavioral_Analysis_for_Fileless_Malware_Detection.pdf
- Size:
- 674.5 KB
- Format:
- Adobe Portable Document Format
