Publication Type : Journal Article
Thematic Areas : TIFAC-CORE in Cyber Security
Publisher : Advances in Intelligent Systems and Computing
Source : Advances in Intelligent Systems and Computing, Springer Verlag, Volume 515, p.551-559 (2017)
ISBN : 9789811031526
Keywords : Back doors, Comparative studies, Computation theory, Computer crime, Computer viruses, Computer worms, Cuckoo sandbox, Dynamic malware analysis, features extraction, Intelligent computing, Learning systems, malware, Malware analysis, Malware detection, OR-networks, Static analysis
Campus : Amritapuri, Coimbatore
School : Centre for Cybersecurity Systems and Networks, School of Engineering
Center : TIFAC CORE in Cyber Security
Department : Computer Science, cyber Security
Year : 2017
Abstract : Malware stands for malicious software. Any file that causes damage to the computer or network can be termed as malicious. For malware analysis, there are two fundamental approaches: static analysis and dynamic analysis. The static analysis focuses on analyzing the file without executing, whereas dynamic analysis means analyzing or observing its behavior while it is being executed. While performing malware analysis, we have to classify malware samples. The different types of malware include worm, virus, rootkit, trojan horse, back door, botnet, ransomware, spyware, adware, and logic bombs. In this paper, our objective is to have a breakdown of techniques used for malware analysis and a comparative study of various malware detection/classification systems. © Springer Nature Singapore Pte Ltd. 2017.
Cite this Research Publication : T. G. Gregory Paul and Dr. Gireesh K. T., “A framework for dynamic malware analysis based on behavior artifacts”, Advances in Intelligent Systems and Computing, vol. 515, pp. 551-559, 2017.