The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Metamorphic Malware Analysis and Detection Methods
Abstract
The term ‘malware’ is collectively used for any program which accesses the system through surreptitious (often unauthorized) means, with malicious intent, resulting in data loss and/or corruption. Some examples are viruses, worms, trojans, botnets etc. Malware is becoming a world-wide epidemic as one infected computer system may compromise all networked systems. Millions of computers connected to the Internet exchange useful data and information and are exposed to malware threats. Malware programs may apply different techniques for unauthorized access, but all of them compromise the system in one way or another. In order to protect from the threats imposed by the malware, we need to understand the techniques used by them in exploiting system vulnerabilities and build an effective detection system. This contribution chapter surveys various malware types, infection mechanisms, detection techniques and metamorphic viruses. This chapter also presents a Longest Common Subsequence (LCS) based methodology for metamorphic malware detection.
Related Content
Hossam Nabil Elshenraki.
© 2024.
23 pages.
|
Ibtesam Mohammed Alawadhi.
© 2024.
9 pages.
|
Akashdeep Bhardwaj.
© 2024.
33 pages.
|
John Blake.
© 2024.
12 pages.
|
Wasswa Shafik.
© 2024.
36 pages.
|
Amar Yasser El-Bably.
© 2024.
12 pages.
|
Sameer Saharan, Shailja Singh, Ajay Kumar Bhandari, Bhuvnesh Yadav.
© 2024.
23 pages.
|
|
|