Back to Search
Start Over
Survey on Representation Techniques for Malware Detection System
- Source :
- American Journal of Applied Sciences. 14:1049-1069
- Publication Year :
- 2017
- Publisher :
- Science Publications, 2017.
-
Abstract
- Malicious programs are malignant software’s designed by hackers or cyber offenders with a harmful intent to disrupt computer operation. In various researches, we found that the balance between designing an accurate architecture that can detect the malware and track several advanced techniques that malware creators apply to get variants of malware are always a difficult line. Hence the study of malware detection techniques has become more important and challenging within the security field. This review paper provides a detailed discussion and full reviews for various types of malware, malware detection techniques, various researches on them, malware analysis methods and different dynamic programming-based tools that could be used to represent the malware sampled. We have provided a comprehensive bibliography in malware detection, its techniques and analysis methods for malware researchers.
- Subjects :
- 0301 basic medicine
Software_OPERATINGSYSTEMS
Multidisciplinary
Cyber-collection
Computer science
business.industry
computer.software_genre
Computer security
Field (computer science)
Cryptovirology
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
03 medical and health sciences
ComputingMethodologies_PATTERNRECOGNITION
030104 developmental biology
Software
Malware
Malware analysis
business
computer
Asprox botnet
Hacker
Subjects
Details
- ISSN :
- 15469239
- Volume :
- 14
- Database :
- OpenAIRE
- Journal :
- American Journal of Applied Sciences
- Accession number :
- edsair.doi...........bbc2e8ac90fdaf7b32f0f83a9b9025d1
- Full Text :
- https://doi.org/10.3844/ajassp.2017.1049.1069