Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Analysis on Malware Recognition Methods

Author : J.N Singh 1

Date of Publication :23rd March 2018

Abstract: Nowadays a malicious program every day is a grave threat. It is created to destroy the computing system, but some of them in the system or data connection is scattered over the linked device.The motive of malware evaluation is to acquire and to provide the necessary data to resolve interference into a system or program. Malicious code or threats is software designed to damage, disrupt or destroy machines, servers, and other related assets. Malware is inserted into devices without its holder's awareness. Servers and mobile devices are really the platforms used for spreading malicious software.Malware always has been a danger to the digital environment, but with the massive increase in internet activity, the malware's effects are becoming serious and it cannot be overlooked. There have be n a number of malicious software indicators made; the efficacy of such indicators depends on the strategies used. The paper gives a comprehensive overview on various types of malware and malware recognition methods.

Reference :

    1. N. Lord, “Common Malware Types: Cybersecurity 101,” Veracode, 2012. .
    2. R. Sihwail, K. Omar, and K. A. Z. Ariffin, “A survey on malware analysis techniques: Static, dynamic, hybrid and memory analysis,” Int. J. Adv. Sci. Eng. Inf. Technol., 2018.
    3. B. Dondogmegd, U. B., and N. J., “A Malware Analysis Using Static and Dynamic Techniques,” http://www.sciencepublishinggroup.com, vol. 5, no. 1, p. 20, 2015.
    4. A. Damodaran, F. Di Troia, C. A. Visaggio, T. H. Austin, and M. Stamp, “A comparison of static, dynamic, and hybrid analysis for malware detection,” J. Comput. Virol. Hacking Tech., 2017. [9] P. G. Shinde, P. D. Motwani, and P. V. Shinde, “Survey on Malware Detection Techniques,” Int. J. Mod. Trends Eng. Res., pp. 74–79, 2015.
    5.  J. Scott, “Signature Based Malware Detection is Dead,” 2017.
    6. R. Mosli, R. Li, B. Yuan, and Y. Pan, “A behaviorbased approach for malware detection,” in IFIP Advances in Information and Communication Technology, 2017, vol. 511, pp. 187–201. 
    7. S Balamurugan, RP Shermy, Gokul Kruba Shanker, VS Kumar, VM Prabhakaran, “An Object Oriented Perspective of Context–Aware Monitoring Strategies for Cloud based Healthcare Systems”,Asian Journal of Research in Social Sciences and Humanities, Volume : 6, Issue : 8, 2016

Recent Article