Date of Publication :21st March 2018
Abstract: Nowadays a malicious program every day is a grave threat. It is created to destroy the computing system, but some of them in the system or data connection is scattered over the linked device.The motive of malware evaluation is to acquire and to provide the necessary data to resolve interference into a system or program. Malicious code or threats is software designed to damage, disrupt or destroy machines, servers, and other related assets. Malware is inserted into devices without its holder's awareness. Servers and mobile devices are really the platforms used for spreading malicious software.Malware always has been a danger to the digital environment, but with the massive increase in internet activity, the malware's effects are becoming serious and it cannot be overlooked. There have been a number of malicious software indicators made; the efficacy of such indicators depends on the strategies used. The paper gives a comprehensive overview on various types of malware and malware recognition method
Reference :
-
- S. Furnell and J. Ward, “Malware,” in Information Security and Ethics, 2013.
- G. A. N. Mohamed and N. B. Ithnin, “Survey on Representation Techniques for Malware Detection System,” Am. J. Appl. Sci., vol. 14, no. 11, pp. 1049–1069, 2017.
- J. Landage and M. Wankhade, “Malware and Malware Detection Techniques: A Survey,” Int. J. Eng. Res. Technol., vol. 2, no. 12, pp. 61–68, 2013.
- V. S. Subrahmanian, M. Ovelgönne, T. Dumitras, and B. A. Prakash, “Types of Malware and Malware Distribution Strategies,” 2015.
- N. Lord, “Common Malware Types: Cybersecurity 101,” Veracode, 2012. .
- R. Sihwail, K. Omar, and K. A. Z. Ariffin, “A survey on malware analysis techniques: Static, dynamic, hybrid and memory a