Malware attack and Malware Analysis : A Research
Keywords:
Keywords: Malware, Viruses, Static Analysis, Dynamic Analysis, Classification, Security.Abstract
Malware analysis is the manner of performing evaluation of the malware and knowledge its moves and conduct. It is of two types- static and dynamic evaluation. Static analysis is carried out by staring at the supply code of the malware and drawing conclusions primarily based on it. Dynamic analysis is the analysis achieved through executing the piece of code and noting its actions. Malware evaluation is an essential and relevant undertaking, for the advanced forms of malware these days are often not even detectable through generally available anti-virus software program. In the present paper, the authors have made a scientific have a look at on one of a kind problems in malware and analysis of malware. One of the most full-size threats to cyber security in nowadays’s world of limitless Internet get right of entry to is malware. In latest times, the malware being designed are polymorphic and metamorphic, with the ability to transform their code and to cover quietly within the structures of the unsuspecting customers.
References
- Gandotra, E., et al. (2014) Malware Analysis and Classification: A Survey. Journal of Information Security, five, 56-sixty four. Http://dx.Doi.Org/10.4236/jis.2014.52006
- (2013) Infographic: The State of Malware. Http://www.Mcafee.Com/in/security-recognition/articles/nation-of-malware-2013.Aspx three"Symantec Internet Security Threat Report: Trends for July–December 2007 (Executive Summary)" (PDF). XIII. Symantec Corp. April 2008: 29. Retrieved 11 May2008.
- "F-Secure Reports Amount of Malware Grew by using one hundred% during 2007" (Press launch). F-Secure Corporation. Four December 2007. Retrieved 11 December 2007
- Andreas Moser, Christopher Kruegel, and Engin Kirda, Limits of Static Analysis for Malware Detection, Secure Systems Lab Technical University Vienna
- “What are viruses, worms, and Trojan horses?". Indiana University. The Trustees of Indiana University. Retrieved 23 February 2015.
- Http://resources.Infosecinstitute.Com/malware-analysis-basics-static-evaluation/eight(2014) Process Monitor. Http://technet.Microsoft.Com/en-us/sysinternals/bb896645.Aspx nineCapture BAT. Https://www.Honeynet.Org/node/315
- (2014) Process Explorer. Http://technet.Microsoft.Com/en-us/sysinternals/bb896653.Aspx elevenProcess Hackerreplace. Http://processhacker.Sourceforge.Net/
- Wireshark. Http://www.Wireshark.Org/
- Regshot. Http://sourceforge.Net/tasks/regshot/
- Egele, M., Scholte, T., Kirda, E. And Kruegel, C. (2012) A Survey on Automated Dynamic Malware-Analysis Techniques and Tools. Journal in ACM Computing Surveys, forty four, Article No. 6.
- Whole-gadget Fine-grained Taint Analysis for Automatic Malware Detection and Analysis Heng Yin hyin@cs.Wm.Edu College of William and Mary Dawn Song dawnsong@cmu.Edu Carnegie Mellon University http://bitblaze.Cs.Berkeley.Edu/papers/malware-hit upon.Pdf
- Efficient and stealthy practise tracing and its programs in computerized malware evaluation: Open problems and demanding situations Endre Bangerter, Stefan B¨uhlmann, and Engin Kirda Bern University of Applied Sciences, Switzerland endre.Bangerter@jdiv.Org Bern University of Applied Sciences and Joe Security, Switzerland stefan.Buehlmann@bfh.Ch Northeastern University, USA ek@ccs.Neu.Edu, http://dl.Ifip.Org/db/conf/ifip11 - 4/inetsec2011/BangerterBK11.Pdf
- Http://cwsandbox.Org/
- Norman Sandbox. Http://sandbox.Norman.No
- Gadhiya et al., International Journal of Advanced Research in Computer Science and Software Engineering three(four), April - 2013, pp. 972-975
- Anubis. Analysis of unknown binaries. Http://anubis.Iseclab.Org
- Toward automatic dynamic malware evaluation the usage of CWSandbox. Http://dl.Acm.Org/citation.Cfm?Id=1262675
- Christopher Elisan (five September 2012). Malware, Rootkits & Botnets A Beginner's Guide. McGraw Hill Professional. Pp. 10–. ISBN 978-zero-07-179205-nine
- Karthik Selvaraj and Nino Fred Gutierrez, The Rise of PDF Malware, Symantec Security Response.
- Jeong Wook (Matt) Oh (jeongoh@microsoft.Com), Recent Java exploitation trends and malware, Black Hat USA 2012 Las Vegas.
- Imtithal A Saeed, Ali Selamat and Ali M A Abuagoub. Article: A Survey on Malware and Malware Detection Systems. International Journal of Computer Applications 67(16):25-31, April 2013. Full textual content to be had.
- Verma, Aparna, M.S.Rao, A.K.Gupta, W. Jeberson, and Vrijendra Singh. "A Literature Review On Malware And Its Analysis." International Journal of Current Research and Review five (2013), 71-82.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.