A SYSTEMATIC LITERATURE REVIEW ON MALWARE ANALYSIS
Main Article Content
Аннотация:
Malware is a significant security danger on the Internet nowadays. Hostile to Virus organizations get a huge number of malwares tests each day. It is intended to harm PC frameworks without the information on the proprietor utilizing the framework and method headways are presenting enormous difficulties for scientists in both the scholarly world and the business.
Article Details
Как цитировать:
Библиографические ссылки:
Arief, B. & Bernard, D, “ Technical and human issues in computer-based systems security”, University of Newcastle upon Tyne, 2010.
H. J. Highland, “A History of Computer Viruses -The Famous ‘Trio’,” Computers & Security, Vol. 60, No. 5, pp. 412-415, 1997.
A. Gazet, “Comparative analysis of various ransomware virii”, Journal in Computer Virology, Vol. 6, No. 1, pp. 7790, 2010.
Barbara Guttman, Edward A. Roback, “An Introduction to Computer Security: The NIST Handbook”,
Computer Systems Laboratory, National Institute of Standards and Technology, Gaithersburg, MD 208990001,1995.
Howard F. Lipson, “Tracking and Tracing CyberAttacks: Technical Challenges and Global Policy Issues”, PhD CERT ® Coordination Center, Networked Systems Survivability Program, 2002.
Nwokedi Idika, Aditya P. Mathur, “A Survey of Malware Detection Techniques”, Department of Computer Science Purdue University, West Lafayette, IN 47907, 2007. [7] Hao, S., Wang, W., Lu, H. and Ren, P. “AutoMal: automatic clustering and signature generation for malwares based on the network flow”, Security Comm. Networks, 2014.
[8] Muazzam Ahmed Siddiqui, “Data mining methods for malware detection”, PhD thesis, College of Sciences, University of Central Florida, Orlando, Florida, 2008. [9] Xue, L., Sun, G., “Design and implementation of a malware detection system based on network behavior”, Security Comm. Networks, 2014.
Threat Expert, “Threat Expert,” Threat Expert, [Online].Available: http://www.threatexpert.com/. [Accessed 20 01 2021]. COMODO, “COMODO Automated Analysis
System,”COMODO, [Online]. Available:http://camas.comodo.com/.[Accessed 19 01 2021].
M. Egele, T. Scholte, E. Kirda, C. Kruegel, “A Survey on Automated Dynamic Malware Analysis Techniques and Tools”, Journal ACM Computing Surveys, Volume 44, Issue 2, Article No. 6, 2012.
M. Christodorescu, S. Jha. “Static analysis of executables to detect malicious patterns”, USENIX Security Symposium, 2003.
F. Leder, B. Steinbeck, P. Martini, “Classification and Detection of Metamorphic Malware using Value Set Analysis”, in 4th International Conference on Malicious and Unwanted Software (MALWARE), 2009.
M. G. Schultz, E. Eskin, E. Zadok, S. J. Stolfo, “Data mining methods for detection of new malicious executables”, In IEEE Symposium on Security and Privacy, 2001.
P.Deshpande, “Metamorphic Detection Using Function Call Graph Analysis”, Master’s Projects, Paper 336 http://scholarworks.sjsu.edu/etd projects/336,2013
G. Shanmugam, R. Low, M. Stamp. “Simple Substitution Distance and Metamorphic Detection,” Journal of Computer Virology and Hacking Techniques, Volume 9, Issue 3, pp. 159–170, 2013.
Languages and Computing, Volume 23, Issue 3,pp. 154– 162,2012.
Deylami, H.M., Muniyandi, R.C., Ardekani, I.T. and Sarrafzadeh, A., 2016, December. Taxonomy of malware detection techniques: A systematic literature review. In 2016 14th Annual Conference on Privacy, Security and Trust (PST) (pp. 629636). IEEE.