Comprehensive Analysis of Advanced Techniques and Vital Tools for Detecting Malware Intrusion

被引:6
作者
Vasani, Vatsal [1 ]
Bairwa, Amit Kumar [1 ]
Joshi, Sandeep [1 ]
Pljonkin, Anton [2 ]
Kaur, Manjit [3 ]
Amoon, Mohammed [4 ]
机构
[1] Manipal Univ Jaipur, Dept Biosci, Ajmer Express Highway, Jaipur 303007, India
[2] Southern Fed Univ, Inst Comp Technol & Informat Secur, Bolshaya Sadovaya Ulitsa,105-42, Rostov Na Donu 344006, Russia
[3] SR Univ, Sch Comp Sci & Artificial Intelligence, Warangal 506371, India
[4] King Saud Univ, Community Coll, Dept Comp Sci, POB 28095, Riyadh 11437, Saudi Arabia
关键词
incident handling; malware; malware detection techniques; malware detection tools; Google Rapid Response (GRR); wireshark; VirusTotal; ARTIFICIAL-INTELLIGENCE; SECURITY; ATTACK;
D O I
10.3390/electronics12204299
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we explore how incident handling procedures are currently being implemented to efficiently mitigate malicious software. Additionally, it aims to provide a contextual understanding of diverse malcodes and their operational processes. This study also compares various ways of detecting adware against a selection of anti-virus software. Moreover, this paper meticulously examines the evolution of hacking, covering the methods employed and the actors involved. A comparative analysis of three prominent malware detection tools, Google Rapid Response (GRR), Wireshark, and VirusTotal, is also conducted, aiding in informed decision-making for enhancing application security. This paper reaches its conclusion by conducting an exhaustive analysis of two case studies, offering valuable insights into a diverse range of potential leaks and virus attacks that may pose threats to various conglomerates. In essence, this article provides a comprehensive overview that spans incident handling procedures, the historical development of hacking, and the diverse spectrum of tools accessible for achieving effective malware detection.
引用
收藏
页数:30
相关论文
共 76 条
  • [1] Alazab A, 2013, COMM COM INF SC, V381, P177
  • [2] Deep Learning Methods for Malware and Intrusion Detection: A Systematic Literature Review
    Ali, Rahman
    Ali, Asmat
    Iqbal, Farkhund
    Hussain, Mohammed
    Ullah, Farhan
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [3] [Anonymous], 2016, P 2016 INT C INV COM
  • [4] A Comprehensive Review on Malware Detection Approaches
    Aslan, Omer
    Samet, Refik
    [J]. IEEE ACCESS, 2020, 8 : 6249 - 6271
  • [5] Auty Mike, 2015, Network Security, V2015, P13, DOI 10.1016/S1353-4858(15)30028-3
  • [6] Robust Malware Detection for Internet of (Battlefield) Things Devices Using Deep Eigenspace Learning
    Azmoodeh, Amin
    Dehghantanha, Ali
    Choo, Kim-Kwang Raymond
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2019, 4 (01): : 88 - 95
  • [7] Bada M., 2014, Glob. Cyber Secur. Capacit. Cent
  • [8] Banerjee U., 2010, Int. J. Comput. Appl., P1, DOI DOI 10.5120/1092-1427
  • [9] Bhatia T, 2017, 2017 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), DOI 10.1109/CyberSecPODS.2017.8074847
  • [10] Hardware Trojan Attacks: Threat Analysis and Countermeasures
    Bhunia, Swarup
    Hsiao, Michael S.
    Banga, Mainak
    Narasimhan, Seetharam
    [J]. PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1229 - 1247