2018
DOI: 10.11591/ijece.v8i5.pp3179-3186
|View full text |Cite
|
Sign up to set email alerts
|

Invesitigation of Malware and Forensic Tools on Internet

Abstract: <p>Malware is an application that is harmful to your forensic information. Basically, malware analyses is the process of analysing the behaviours of malicious code and then create signatures to detect and defend against it.Malware, such as Trojan horse, Worms and Spyware severely threatens the forensic security. This research observed that although malware and its variants may vary a lot from content signatures, they share some behaviour features at a higher level which are more precise in revealing the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 28 publications
(40 reference statements)
0
3
0
Order By: Relevance
“…Malware, or more precisely, malicious software, stands for software or program which infiltrates and damages computer systems with no prior consent to the system owner. Over the years, malware is indicated as a security threat by cyber security standards [1]. Malware includes viruses, Trojan horses, worms, exploits, botnets, and retroviruses [2].…”
Section: Introductionmentioning
confidence: 99%
“…Malware, or more precisely, malicious software, stands for software or program which infiltrates and damages computer systems with no prior consent to the system owner. Over the years, malware is indicated as a security threat by cyber security standards [1]. Malware includes viruses, Trojan horses, worms, exploits, botnets, and retroviruses [2].…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays the cybercriminals implement different ways to obtain the profit from the legitimate businesses, which have become theirs target. Malware are one of the most powerful cybercriminals' tools for attaining such goals [1][2]. One the type of the malicious action against the users' computer systems, cloud infrastructure the distributed denial-of-service (DDoS) attacks-the attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic [3].…”
Section: Introductionmentioning
confidence: 99%
“…With data from a single credit card being sold for up to $45 on underground markets, just 10 credit cards stolen from compromised websites could result in a yield of up to $2.2 million for cyber criminals each month. Cyberattacks primarily exploit software vulnerabilities [3,4]. Thus, it is essential to find and manage such vulnerabilities at an early stage to prevent various types of damage, e.g., revealing confidential information or financial harm to both corporate enterprises and general users.…”
Section: Introductionmentioning
confidence: 99%