Design and Implementation of Malware Detection Scheme

Full Text (PDF, 581KB), PP.58-66

Views: 0 Downloads: 0

Author(s)

Sonali Sharma 1,*

1. Department of CSE & IT Global Institute of Technology and management, Gurugram, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijcnis.2018.08.07

Received: 15 Mar. 2018 / Revised: 25 May 2018 / Accepted: 10 Jul. 2018 / Published: 8 Aug. 2018

Index Terms

Virus, Ransomware, Anti-virus, System scan, vulnerable file extensions, Shadow volume copies

Abstract

Malware is a worldwide epidemic and studies suggest that with the evolution of internet it is getting even worse. There is a new virus implemented every minute and various relevant strategies and tactics have been proposed to alleviate and eradicate cyber threats. Therefore, major concern for the researchers today is to detect and mitigate such programs. In this paper an effort has been made to propose a system which will detect some dangerous viruses and some features of the recently emerged new form of malware in cyberspace known as Ransomware. Imposing serious threats to information assets protection ransomware victimizes the internet users by hijacking user files, encrypting them, then demanding a ransom to be paid in exchange of the decryption key. The proposed program aims to scan the system to get hold of all vulnerable files present on the system and to detect the malicious one’s and remove them.

Cite This Paper

Sonali Sharma, "Design and Implementation of Malware Detection Scheme", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.8, pp.58-66, 2018. DOI:10.5815/ijcnis.2018.08.07

Reference

[1]Ankush R Kakad, Siddharth G Kamble, Shrinivas S Bhuvad and Vinayak N Malavade, ”Study and Comparison of Virus Detection Techniques“, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 3, March 2014.
[2]Khawla Abdulla Alghafli et. al. ,”Forensic analysis of windows 7 registry”, Edith Cowan University Research Online, Australian Digital ForensicsConference,2010.
[3]Sarika chaudhary et. al.,” How Anti-virus Software Works?”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 4, April 2013.
[4]Savan Gadhiya and Kaushal Bhavsar, ”Techniques for Malware Analysis “ ,International Journal of Advanced Research in Computer Science and Software Engineering ,Volume 3, Issue 4,India, April 2013.
[5]Sandeep kumar et al., “Malicious Data Classification Using Structural Information and Behavioral Specifications in Executables”, Proceedings of 2014 RAECS UIET Punjab University Chandigarh, 06 – 08March, 2014.
[6]Jing Liu, Yang Xiao, Kaveh Ghaboosi, Hongmei Deng and Jingyuan Zhang “Botnet: Classification, attacks, Detection, tracing, and preventive measures.” Hindawi Publishing Corporation EURASIP Journal on Wireless Communications and Networking, Volume 2009.
[7]Amin kharaz, sajjad Arshad, Collin Muliner, William Robertson and Egin Kirda, “UNVEIL: A large-scale automated approach to detecting Ransomware.”, USENIX security symposium, Northeastern university, August 2016.
[8]Xin luo and Qinyu Liao, “Awareness education as the key to ransomware prevention”, Information systems security, USA, 2007.
[9]Tulika Mithal, Kshitij Shah and Dushyant Kumar Singh, “Case Studies on Intelligent Approaches for Static Malware Analysis” ,Emerging Research in Computing, Information, Communication and Applications ,10 may 2016.
[10]http://www.gfi.com/blog/2015s-mvps-the-most-vulnerable-players/
[11]http://research.omicsgroup.org/index.php/Ransomware
[12]http://www.howtogeek.com/137270/50-file-extensions-that-are-potentially-dangerous-on-windows/
[13]https://msdn.microsoft.com/en-us/library/930b76w0(v=vs.90).aspx
[14]https://www.webroot.com/in/en/home/resources/tips/pc-security/security-what-is-anti-virus-software
[15]http://marcoramilli.blogspot.in/2016/12/malware-training-sets-machine-learning.html
[16]https://www.bleepingcomputer.com/tutorials/how-to-recover-files-and-folders-using-shadow-volume-copies/
[17]Sonali Sharma and Shilpa mahajan, “Design and implementation of security scheme for detecting system vulnerabilities”, International journal of computer network and information security, Vol.9, October, 2017.