Malicious Code Detonation Tester
Description
Year: 2020
There are approximately 125 million emails sent/received at Duke during a given month. Of those emails, approximately 68 million are blocked as suspicious (spam, malware, virus, etc.). However, numerous phishing attacks get through each month and make it to users' inboxes. These phishing attacks entice users to click on a URL or open an attachment to install malware on their computers. A team of Duke students will work closely with Duke's Information Technology Security Office to develop an easy to use malware sandbox that can receive URLs and files and load them in a safe, isolated environment.
Duke stakeholders: IT Security Office, Office of Information Technology
Final Solution
Malware Attachment Analysis
Every month, millions of emails with malicious code are sent throughout Duke networks. The Malware Attachment Analysis web application allows anyone in the Duke community to quickly scan files and emails to detect malicious code and viruses. Using an intuitive, responsive design for everyday users, the application leverages Django and libraries such as Yara and VirusTotal. This project aimed to contribute towards a safer online environment for all Duke community members.
View the team's final presentation on YouTube.
Team
Members
Leaders
Sponsors
2020