A SYSTEMATIC LITERATURE REVIEW ON MALWARE ANALYSIS

Authors

  • Khusanboy Shoraimov Teacher of the Department, “Systematic and Practical Programming”, Tashkent University of Information Technologies named after Muhammad Al-Khwarizmi, UZBEKISTAN Author
  • Islomjon Akhmadjonov Teacher of the Department, “Systematic and Practical Programming”, Tashkent University of Information Technologies named after Muhammad Al-Khwarizmi, UZBEKISTAN Author

Keywords:

Malware; Malware analytics; Malware code; Taxonomy; Signature-based; Anomaly-based; Malware system requirements.

Abstract

Malware is a significant security danger on the Internet nowadays. Hostile to Virus organizations get a huge number of malwares tests each day. It is intended to harm PC frameworks without the information on the proprietor utilizing the framework and method headways are presenting enormous difficulties for scientists in both the scholarly world and the business.

References

Arief, B. & Bernard, D, “ Technical and human issues in computer-based systems security”, University of Newcastle upon Tyne, 2010.

H. J. Highland, “A History of Computer Viruses -The Famous ‘Trio’,” Computers & Security, Vol. 60, No. 5, pp. 412-415, 1997.

A. Gazet, “Comparative analysis of various ransomware virii”, Journal in Computer Virology, Vol. 6, No. 1, pp. 7790, 2010.

Barbara Guttman, Edward A. Roback, “An Introduction to Computer Security: The NIST Handbook”,

Computer Systems Laboratory, National Institute of Standards and Technology, Gaithersburg, MD 208990001,1995.

Howard F. Lipson, “Tracking and Tracing CyberAttacks: Technical Challenges and Global Policy Issues”, PhD CERT ® Coordination Center, Networked Systems Survivability Program, 2002.

Nwokedi Idika, Aditya P. Mathur, “A Survey of Malware Detection Techniques”, Department of Computer Science Purdue University, West Lafayette, IN 47907, 2007. [7] Hao, S., Wang, W., Lu, H. and Ren, P. “AutoMal: automatic clustering and signature generation for malwares based on the network flow”, Security Comm. Networks, 2014.

[8] Muazzam Ahmed Siddiqui, “Data mining methods for malware detection”, PhD thesis, College of Sciences, University of Central Florida, Orlando, Florida, 2008. [9] Xue, L., Sun, G., “Design and implementation of a malware detection system based on network behavior”, Security Comm. Networks, 2014.

Threat Expert, “Threat Expert,” Threat Expert, [Online].Available: http://www.threatexpert.com/. [Accessed 20 01 2021]. COMODO, “COMODO Automated Analysis

System,”COMODO, [Online]. Available:http://camas.comodo.com/.[Accessed 19 01 2021].

M. Egele, T. Scholte, E. Kirda, C. Kruegel, “A Survey on Automated Dynamic Malware Analysis Techniques and Tools”, Journal ACM Computing Surveys, Volume 44, Issue 2, Article No. 6, 2012.

M. Christodorescu, S. Jha. “Static analysis of executables to detect malicious patterns”, USENIX Security Symposium, 2003.

F. Leder, B. Steinbeck, P. Martini, “Classification and Detection of Metamorphic Malware using Value Set Analysis”, in 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009.

M. G. Schultz, E. Eskin, E. Zadok, S. J. Stolfo, “Data mining methods for detection of new malicious executables”, In IEEE Symposium on Security and Privacy, 2001.

P.Deshpande, “Metamorphic Detection Using Function Call Graph Analysis”, Master’s Projects, Paper 336 http://scholarworks.sjsu.edu/etd projects/336,2013

G. Shanmugam, R. Low, M. Stamp. “Simple Substitution Distance and Metamorphic Detection,” Journal of Computer Virology and Hacking Techniques, Volume 9, Issue 3, pp. 159–170, 2013.

Languages and Computing, Volume 23, Issue 3,pp. 154– 162,2012.

Deylami, H.M., Muniyandi, R.C., Ardekani, I.T. and Sarrafzadeh, A., 2016, December. Taxonomy of malware detection techniques: A systematic literature review. In 2016 14th Annual Conference on Privacy, Security and Trust (PST) (pp. 629636). IEEE.

Published

2022-12-21

How to Cite

A SYSTEMATIC LITERATURE REVIEW ON MALWARE ANALYSIS. (2022). Eurasian Journal of Academic Research, 2(13), 860-866. https://in-academy.uz/index.php/EJAR/article/view/1631