CFP last date
20 May 2024
Reseach Article

MalDet: How to Detect the Malware?

by Samridhi Sharma, Shabnam Parveen
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 6
Year of Publication: 2015
Authors: Samridhi Sharma, Shabnam Parveen
10.5120/ijca2015905351

Samridhi Sharma, Shabnam Parveen . MalDet: How to Detect the Malware?. International Journal of Computer Applications. 123, 6 ( August 2015), 17-21. DOI=10.5120/ijca2015905351

@article{ 10.5120/ijca2015905351,
author = { Samridhi Sharma, Shabnam Parveen },
title = { MalDet: How to Detect the Malware? },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 6 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number6/21963-2015905351/ },
doi = { 10.5120/ijca2015905351 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:11:56.329659+05:30
%A Samridhi Sharma
%A Shabnam Parveen
%T MalDet: How to Detect the Malware?
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 6
%P 17-21
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Malware is malicious software. This software used to interrupt computer functionality. Protecting the internet is probably a enormous task that the contemporary epoch of computers have seen. Day by day the threat levels large thus making the network susceptible to attacks. Many novel strategies are brought into the field of cyber security to guard websites from attacks. But still malware has remained a grave reason of anxiety to web developers and server administrators. With this war takes place amid the security community and malicious software developers, the security specialists use all possible techniques, methods and strategies to discontinue and eliminate the threats while the malware developers utilize new types of malwares that avoid implemented security features. Easing this dilemma entirely is a rising area of research. This paper is aimed at classification of malware and the various ways of detecting them.

References
  1. R. Ford and W. H. Allen, “Malware Shall Greatly Increase...,” Secur. Priv. IEEE, vol. 7, no. 6, pp. 69–71, 2009.
  2. S.divya “A Survey on Various Security attacks vulnerabilities and detection Techniques ”International Journal of Enginerring and Technology”
  3. H. Gao, J. Hu, T. Huang, J. Wang, and Y. Chen, “Security issues in online social networks,” Internet Comput. IEEE, vol. 15, no. 4, pp. 56–63, 2011
  4. Yossi Spiegel, "Commercial software, adware, and consumer privacy." International Journal of Industrial Organization 31, no. 6 (2013): 702-713
  5. Luca Invernizzi et.al “EVILSEED: A Guided Approach to Finding Malicious Web Pages”,2012 IEEE 2012 IEEE Symposium on Security and Privacy.
  6. Karan B. Maniar ”Overview of Cyber Security” International Journal of Engineering Trends and Technology (IJETT)Volume 15 Number 3– Sep 2014
  7. H. B. Kazemian and S. Ahmed. "Comparisons of machine learning techniques for detecting malicious webpages." Expert Systems with Applications 42, no. 3 (2015): 1166-117.
  8. P. Vinod, R. Jaipur, V. Laxmi, and M. Gaur, “Survey on malware detection methods,” in Proceedings of the 3rd Hackers’ Workshop on Computer and International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2(4): 10-29 The Society of Digital Information and Wireless Communications, 2013 (ISSN: 2305-0012) Internet Security (IITKHACK’09), 2009, pp. 74–79.
  9. Mihai Christodorescu and Somesh Jha ,” Testing Malware Detectors”,in Proc. ISSTA’04, July 11 - 14, 2004.pages 33-44, Boston, MAUSA, ACM Press.Heng Yin ,Dawn Song ,Manuel
  10. Egele,Christopher Krugel , and EnginKirda , “Panorama: Capturing System – wide Information Flow forMalware Detection and Analysis”, in Proc CCS’07, October 29 –November 2, 2007, Alexandria, Virginia, USA,ACM Press.
  11. Andreas Moser , Christopher Krugel , and Engin Kirda, “ExploringMultiple Execution Paths for Malware Analysis”, Secure Systems Lab, Technical University Vienna.
  12. Greoigre Jacob,Herve Debar,Eric Fillol,”Behavioral detection of malware:from a survey towards an established taxonomy”,Springer-Verlag France 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Attacks Obfuscation Malware Normalizer reverse engineering.