Malware attack and Malware Analysis : A Research

Authors

  • Soumen Chakraborty  Department of Information Technology, MCKV Institute of Engineering, MAKAUT, West Bengal, India

Keywords:

Keywords: Malware, Viruses, Static Analysis, Dynamic Analysis, Classification, Security.

Abstract

Malware analysis is the manner of performing evaluation of the malware and knowledge its moves and conduct. It is of two types- static and dynamic evaluation. Static analysis is carried out by staring at the supply code of the malware and drawing conclusions primarily based on it. Dynamic analysis is the analysis achieved through executing the piece of code and noting its actions. Malware evaluation is an essential and relevant undertaking, for the advanced forms of malware these days are often not even detectable through generally available anti-virus software program. In the present paper, the authors have made a scientific have a look at on one of a kind problems in malware and analysis of malware. One of the most full-size threats to cyber security in nowadays’s world of limitless Internet get right of entry to is malware. In latest times, the malware being designed are polymorphic and metamorphic, with the ability to transform their code and to cover quietly within the structures of the unsuspecting customers.

References

  1. Gandotra, E., et al. (2014) Malware Analysis and Classification: A Survey. Journal of Information Security, five, 56-sixty four. Http://dx.Doi.Org/10.4236/jis.2014.52006
  2. (2013) Infographic: The State of Malware. Http://www.Mcafee.Com/in/security-recognition/articles/nation-of-malware-2013.Aspx three"Symantec Internet Security Threat Report: Trends for July–December 2007 (Executive Summary)" (PDF). XIII. Symantec Corp. April 2008: 29. Retrieved 11 May2008.
  3. "F-Secure Reports Amount of Malware Grew by using one hundred% during 2007" (Press launch). F-Secure Corporation. Four December 2007. Retrieved 11 December 2007
  4. Andreas Moser, Christopher Kruegel, and Engin Kirda, Limits of Static Analysis for Malware Detection, Secure Systems Lab Technical University Vienna
  5. “What are viruses, worms, and Trojan horses?". Indiana University. The Trustees of Indiana University. Retrieved 23 February 2015.
  6. Http://resources.Infosecinstitute.Com/malware-analysis-basics-static-evaluation/eight(2014) Process Monitor. Http://technet.Microsoft.Com/en-us/sysinternals/bb896645.Aspx nineCapture BAT. Https://www.Honeynet.Org/node/315
  7. (2014) Process Explorer. Http://technet.Microsoft.Com/en-us/sysinternals/bb896653.Aspx elevenProcess Hackerreplace. Http://processhacker.Sourceforge.Net/
  8. Wireshark. Http://www.Wireshark.Org/
  9. Regshot. Http://sourceforge.Net/tasks/regshot/
  10. Egele, M., Scholte, T., Kirda, E. And Kruegel, C. (2012) A Survey on Automated Dynamic Malware-Analysis Techniques and Tools. Journal in ACM Computing Surveys, forty four, Article No. 6.
  11. Whole-gadget Fine-grained Taint Analysis for Automatic Malware Detection and Analysis Heng Yin [email protected] College of William and Mary Dawn Song [email protected] Carnegie Mellon University http://bitblaze.Cs.Berkeley.Edu/papers/malware-hit upon.Pdf
  12. Efficient and stealthy practise tracing and its programs in computerized malware evaluation: Open problems and demanding situations Endre Bangerter, Stefan B¨uhlmann, and Engin Kirda Bern University of Applied Sciences, Switzerland [email protected] Bern University of Applied Sciences and Joe Security, Switzerland [email protected] Northeastern University, USA [email protected], http://dl.Ifip.Org/db/conf/ifip11 - 4/inetsec2011/BangerterBK11.Pdf
  13. Http://cwsandbox.Org/
  14. Norman Sandbox. Http://sandbox.Norman.No
  15. Gadhiya et al., International Journal of Advanced Research in Computer Science and Software Engineering three(four), April - 2013, pp. 972-975
  16. Anubis. Analysis of unknown binaries. Http://anubis.Iseclab.Org
  17. Toward automatic dynamic malware evaluation the usage of CWSandbox. Http://dl.Acm.Org/citation.Cfm?Id=1262675
  18. Christopher Elisan (five September 2012). Malware, Rootkits & Botnets A Beginner's Guide. McGraw Hill Professional. Pp. 10–. ISBN 978-zero-07-179205-nine
  19. Karthik Selvaraj and Nino Fred Gutierrez, The Rise of PDF Malware, Symantec Security Response.
  20. Jeong Wook (Matt) Oh ([email protected]), Recent Java exploitation trends and malware, Black Hat USA 2012 Las Vegas.
  21. Imtithal A Saeed, Ali Selamat and Ali M A Abuagoub. Article: A Survey on Malware and Malware Detection Systems. International Journal of Computer Applications 67(16):25-31, April 2013. Full textual content to be had.
  22. Verma, Aparna, M.S.Rao, A.K.Gupta, W. Jeberson, and Vrijendra Singh. "A Literature Review On Malware And Its Analysis." International Journal of Current Research and Review five (2013), 71-82.

Downloads

Published

2019-06-30

Issue

Section

Research Articles

How to Cite

[1]
Soumen Chakraborty, " Malware attack and Malware Analysis : A Research, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 3, pp.268-272, May-June-2019.