A Comparison study of Computer Virus and Detection Techniques

Authors

  • Soumen Chakraborty  Department of Information Technology, MCKV Institute of Engineering, MAKAUT, West Bengal, India

Keywords:

Virus, Virus Detection, Signature-Based Virus Detection, Anomaly-Based Detection, Trojan

Abstract

The virus is a kind of program which seriously infects the system, large organizations nowadays have big data to maintain which are spread to various locations in the world. As a result, security is a major issue for all companies nowadays. The data is the ultimate asset for any people nowadays. Which needs various precautions to maintain to keep safe those assets. As there is growing the popularity of various kind of virus like malware,trojan,hackers,adware it is really becoming a challenge to keep the system secure.With the growing popularity of internet in our daily lives, the risk of various kind of threats is also increasing day by day. There is various kind of virus also various kind of mechanism to catch that virus which needs proper analysis.In this paper, there is a small survey of various kind of virus detection methods along with their consequences it does to the system.That will help to understand the merits and demerits of each virus after the survey.At the end, there is a conclusion and some information on what can be done to keep away from the virus in a large virtual world.

References

  1. Dr. Prof. Milind. J. Joshi , Mr. Bhaskar V. Patil ,Shivaji University Kolhapur, Kolhapur M.S.], INDIA,Computer Virus: Their Problems & Major attacks in Real Life,ISSN: 2249-2615
  2. Dr. Solomon's Virus Encyclopedia, 1995, ISBN 1897661002
  3. Dr. Klaus Brunnstein 1999, from Antivirus to Antimalware Software and Beyond http://csrc.nist.gov/nissc/1999/proceeding/papers /p12.pdf
  4. H. Shravan Kumar, “Seminar Report on Study of Viruses and Worms”,Indian Institute of Technology Bombay, 2005.
  5. K. Mathur, S. Hiranwal, “A Survey on Techniques in Detection and Analyzing Malware Executables”, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Vol. 3, Issue 4, April 2013
  6. Hossein Bidgoli, Handbook of Information Security, Volume 3,1st Edition, John Wiley & Sons, ISBN-10: 0471648337, ISBN-13: 978-0471648338, December, 2005
  7. S. Venkatachalam, M. Stamp, “Detecting Undetectable Metamorphic Viruses”, Proceedings of the 2011 International Conference on Security & Management (SAM 2011), pp. 340-345, 2011,ISBN-10: 1-60132-196-1.
  8. D.RAKESH, L. PADMALATHA,PATTERN MATCHING ALGORITHM USING FILTER ENGINE AND EXACTMATCHING ENGINE, INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH & TECHNOLOGY (IJERT)VOL. 1 ISSUE 7, SEPTEMBER – 2012
  9. Min Feng Rajiv Gupta, Detecting Virus Mutations Via Dynamic Matching, CSE Dept., University of California
  10. Ankush R Kakad, Siddharth G Kamble, Shrinivas S Bhuvad, Vinayak N Malavade , Study and Comparison of Virus Detection Techniques , Volume 4, Issue 3, March 2014 , ISSN: 2277 128X
  11. Jan Hruska. Computer Viruses and Anti-VirusWarfare. Ellis Horwood, Chichester, England,
  12. Wing Wong, ANALYSIS AND DETECTION OF METAMORPHICCOMPUTER VIRUSES, A Writing Project Presented toThe Faculty of the Department of ComputerScienceSan Jose State University.
  13. Szor, P., The Art of Computer Virus Research and Defense, Addison-Wesley Professional, 2005.
  14. ESSAM AL DAOUD1, IQBAL H. JEBRIL2AND BELALZAQAIBEH, COMPUTER VIRUS STRATEGIES AND DETECTIONMETHODSESSAM ,INT. J. OPEN PROBLEMS COMPT. MATH., VOL. 1, NO. 2, SEPTEMBER 2008.

Downloads

Published

2017-02-28

Issue

Section

Research Articles

How to Cite

[1]
Soumen Chakraborty, " A Comparison study of Computer Virus and Detection Techniques, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 1, pp.236-240, January-February-2017.