2013
DOI: 10.5120/11480-7108
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Malware and Malware Detection Systems

Abstract: Over the last decades, there were lots of studies made on malware and their countermeasures. The most recent reports emphasize that the invention of malicious software is rapidly increasing. Moreover, the intensive use of networks and Internet increases the ability of the spreading and the effectiveness of this kind of software. On the other hand, researchers and manufacturers making great efforts to produce anti-malware systems with effective detection methods for better protection on computers. In this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0
1

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 73 publications
(34 citation statements)
references
References 68 publications
0
33
0
1
Order By: Relevance
“…Traditional computing environments are mainly based on X86 architecture, there exists a wide array of studies on malware propagation and analysis in X86 and/or X64 without consideration of device interaction with other architectures hence homogeneity based on specific architecture and operating system. Examples of such studies includes: on malware taxonomies [38,61,62], on malware detection [63][64][65][66][67], malware propagation [68] and malware analysis [69]. Windows variants of operating systems in both X86 and X64 architectures are most vulnerable to malware infections.…”
Section: Platforms and Iot Malwarementioning
confidence: 99%
“…Traditional computing environments are mainly based on X86 architecture, there exists a wide array of studies on malware propagation and analysis in X86 and/or X64 without consideration of device interaction with other architectures hence homogeneity based on specific architecture and operating system. Examples of such studies includes: on malware taxonomies [38,61,62], on malware detection [63][64][65][66][67], malware propagation [68] and malware analysis [69]. Windows variants of operating systems in both X86 and X64 architectures are most vulnerable to malware infections.…”
Section: Platforms and Iot Malwarementioning
confidence: 99%
“…The antivirus industry has been quite a mature database to handle issues of viruses, malware, Spywares and Spams having already detected signatures. Different Malware and their detection approaches are described in [100].…”
Section: Known Solutions and Problem Areasmentioning
confidence: 99%
“…For attaining efficiency and robustness, the system adheres to the best feature type which explores a meaningful corpus of malwares. In static analysis, the expected behavior of program is determined over the observations in its binary code or internal structure of files instead of actually executing it [6]. The static feature uniquely identifies the signature of malware or malware families.…”
Section: Malware Analysismentioning
confidence: 99%
“…Researchers have adopted supervised machine learning approach which uses classifiers Decision trees, Support vector machine, Nave bayes, Bayesian network, KNN algorithm, etc. are mentioned in [6,7,1]. The best classifier is chosen which gives the clear margin, and reduces interference and misclassification between maliciousness and benignancy of executables.…”
Section: General Framework Of Malware Detection Systemmentioning
confidence: 99%