The World of Malware: An Overview

被引:25
作者
Namanya, Anita Patience [1 ]
Cullen, Andrea [2 ]
Awan, Irfan U. [2 ]
Disso, Jules Pagna [3 ]
机构
[1] Ankole Western Univ, Fac Sci & Technol, Sheema, Uganda
[2] Univ Bradford, Sch Elect Engn & Comp Sci, Bradford, W Yorkshire, England
[3] Nettitude Intelligent Cyber Secur & Risk Manageme, Res & Dev, Royal Leamington Spa, England
来源
2018 IEEE 6TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD 2018) | 2018年
关键词
Malware; Malware evolution; Malware Analysis; Malware detection;
D O I
10.1109/FiCloud.2018.00067
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Malware, short for malicious software is a program code that is hostile and often used to corrupt or misuse a system. Introducing malware into a computer network environment has different effects depending on the design intent of the malware and the network layout. Malware detection and prevention systems are bypassed by malicious files in computer systems as malware become more complex and large in numbers. This paper presents an overview of the world of malware with the intent of providing the underlying information for the intended study into developing malware detection approaches.
引用
收藏
页码:420 / 427
页数:8
相关论文
共 30 条
[1]  
[Anonymous], 2016, J COMPUT VIROL HACKI
[2]  
Aycock J., 2006, Computer Viruses and Malware, V22
[3]  
Aycock J, 2011, ADV INFORM SECUR, V50, P1, DOI 10.1007/978-0-387-77741-2
[4]   Different Obfuscation Techniques for Code Protection [J].
Behera, Chandan Kumar ;
Bhaskari, D. Lalitha .
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS, 2015, 70 :757-763
[5]  
Bitdefender, 2010, HIST MALW
[6]  
Christodorescu M, 2007, ADV INFORM SECUR, P193
[7]   A Survey on Automated Dynamic Malware-Analysis Techniques and Tools [J].
Egele, Manuel ;
Scholte, Theodoor ;
Kirda, Engin ;
Kruegel, Christopher .
ACM COMPUTING SURVEYS, 2012, 44 (02)
[8]  
Eilam E., 2005, Reversing: Secrets of Reverse Engineering
[9]  
Elias J. K. Bachaalany, ANTIVIRUS HACKERS HD
[10]  
Elisan C.C., 2012, Malware, Rootkits Botnets A Beginner's Guide