2020
DOI: 10.48550/arxiv.2002.06819
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Tools and Techniques for Malware Detection and Analysis

Abstract: One of the major and serious threats that the Internet faces today is the vast amounts of data and files which need to be evaluated for potential malicious intent. Malicious software, often referred to as a malware that are designed by attackers are polymorphic and metamorphic in nature which have the capability to change their code as they spread. Moreover, the diversity and volume of their variants severely undermine the effectiveness of traditional defenses which typically use signature based techniques and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 9 publications
(16 citation statements)
references
References 31 publications
0
16
0
Order By: Relevance
“…Machine learning has been used in solving social network problems [4][5][6][7] to cybersecurity issues [8,9], building automated digital systems [10] to e-governance solution [11]. However, there have been very limited attempts to apply this technique to tackle the mental illness issue.…”
Section: Related Workmentioning
confidence: 99%
“…Machine learning has been used in solving social network problems [4][5][6][7] to cybersecurity issues [8,9], building automated digital systems [10] to e-governance solution [11]. However, there have been very limited attempts to apply this technique to tackle the mental illness issue.…”
Section: Related Workmentioning
confidence: 99%
“…It collects data about a user's online browsing history to target advertisements. The most common motivation for Adware is to collect data about the user to earn advertising revenue [5,[7][8][9][10][11][12][13][14][15].…”
Section: Adwarementioning
confidence: 99%
“…It keeps track of a user's login credentials, such as usernames and passwords, or collects sensitive data. Keyloggers are common spyware that records keystrokes on the keyboard and captures the login credentials [7][8][9][10].…”
Section: Spywarementioning
confidence: 99%
“…A comprehensive review of malware analysis tools that detect and analyze malware executables is given in [95]. Except for reverse engineering tools as well as memory forensics, packet analysis, detection tools, online scanners and sandboxes were elaborated.…”
Section: Other Surveysmentioning
confidence: 99%