INFORMATION CHANGE THE WORLD

International Journal of Education and Management Engineering(IJEME)

ISSN: 2305-3623 (Print), ISSN: 2305-8463 (Online)

Published By: MECS Press

IJEME Vol.8, No.2, Mar. 2018

A Study on Malware and Malware Detection Techniques

Full Text (PDF, 353KB), PP.20-30


Views:66   Downloads:6

Author(s)

Rabia Tahir

Index Terms

Malware;malware analysis techniques;malware detection techniques

Abstract

The impact of malicious software are getting worse day by day. Malicious software or malwares are programs that are created to harm, interrupt or damage computers, networks and other resources associated with it. Malwares are transferred in computers without the knowledge of its owner. Mostly the medium used to spread malwares are networks and portable devices. Malwares are always been a threat to digital world but with a rapid increase in the use of internet, the impacts of the malwares become severe and cannot be ignored. A lot of malware detectors have been created, the effectiveness of these detectors depend upon the techniques being used. Although researchers are developing latest technologies for the timely detection of malwares but still malware creators always stay one step ahead. In this paper, a detailed review of malwares types are provided, malware analysis and detection techniques are studied and compared. Furthermore, malware obfuscation techniques have also been presented.

Cite This Paper

Rabia Tahir,"A Study on Malware and Malware Detection Techniques", International Journal of Education and Management Engineering(IJEME), Vol.8, No.2, pp.20-30, 2018.DOI: 10.5815/ijeme.2018.02.03

Reference

[1]Adelstein, Frank, Matthew Stillerman, and Dexter Kozen. "Malicious code detection for open firmware." Computer Security Applications Conference, 2002. Proceedings. 18th Annual. IEEE, 2002.

[2]Bergeron, Jean, et al. "Static detection of malicious code in executable programs." Int. J. of Req. Eng 2001.184-189 (2001): 79.

[3]William, Stallings. Computer Security: Principles And Practice. Pearson Education India, 2008.

[4]Spafford, Eugene. "The internet worm incident." ESEC'89 (1989): 446-468.

[5]Idika, Nwokedi, and Aditya P. Mathur. "A survey of malware detection techniques." Purdue University 48 (2007).

[6]Li, Jun, and Shad Stafford. "Detecting smart, self-propagating Internet worms." Communications and Network Security (CNS), 2014 IEEE Conference on. IEEE, 2014.

[7]Yin, Heng, et al. "Panorama: capturing system-wide information flow for malware detection and analysis." Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007.

[8]You, Ilsun, and Kangbin Yim. "Malware obfuscation techniques: A brief survey." Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on. IEEE, 2010.

[9]Beaucamps, Philippe. "Advanced polymorphic techniques." International Journal of Computer Science 2.3 (2007): 194-205.

[10]Szor, Peter. The art of computer virus research and defense. Pearson Education, 2005.

[11]You, Ilsun, and Kangbin Yim. "Malware obfuscation techniques: A brief survey." Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on. IEEE, 2010.

[12]Christodorescu, Mihai, and Somesh Jha. Static analysis of executables to detect malicious patterns. Wisconsin Univ-Madison Dept of Computer Sciences, 2006.

[13]Konstantinou, E., and S. Wolthusen. Metamorphic Virus: Analysis and Detection Technical Report. RHUL-MA-2008-02 Department of Mathematics Royal Holloway, University of London, 2008.

[14]Elhadi, Ammar AE, Mohd A. Maarof, and Ahmed H. Osman. "Malware detection based on hybrid signature behaviour application programming interface call graph." American Journal of Applied Sciences 9.3 (2012): 283.

[15]Landage, Jyoti, and M. P. Wankhade. "Malware and malware detection techniques: A survey." International Journal of Engineering Research and Technology (IJERT) 2.12 (2013): 2278-0181.

[16]Jacob, Grégoire, Hervé Debar, and Eric Filiol. "Behavioral detection of malware: from a survey towards an established taxonomy." Journal in computer Virology 4.3 (2008): 251-266.

[17]Robiah, Y., et al. "A new generic taxonomy on hybrid malware detection technique." arXiv preprint arXiv: 0909.4860 (2009).

[18]Chumachenko, Kateryna. "Machine Learning Methods for Malware Detection and Classification." (2017).

[19]Rad, Babak Bashari, Maslin Masrom, and Suhaimi Ibrahim. "Camouflage in malware: from encryption to metamorphism." International Journal of Computer Science and Network Security 12.8 (2012): 74-83.