Taxonomy of malware detection techniques

Loading...
Thumbnail Image
Other Title
Authors
Mohaddes Deylami, Hanif
Muniyandi, R.C.
Ardekani, Iman
Sarrafzadeh, Hossein
Author ORCID Profiles (clickable)
Degree
Grantor
Date
2016-12
Supervisors
Type
Conference Contribution - Paper in Published Proceedings
Ngā Upoko Tukutuku (Māori subject headings)
Keyword
malware
malicious code
taxonomy
anomaly-based
signature based
system requirements
intrusion detection systems (IDS)
ANZSRC Field of Research Code (2020)
Citation
Mohaddes Deylami, H., Muniyandi, R. C., Ardekani, I. T., , & Sarrafzadeh, H. (2016, December). Taxonomy of malware detection techniques. IEEE Xplore (Ed.), 016 14th Annual Conference on Privacy, Security and Trust (PST) (pp.629-636). 10.1109/PST.2016.7906998.
Abstract
Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends on the technology used. Therefore, it is paramount that the advantages and disadvantages of each type of technology are scrutinized analytically. This study’s aim is to scrutinize existing publications on this subject and to follow the trend that has taken place in the advancement and development with reference to the amount of information and sources of such literature. Many of the malware programs are huge and complicated and it is not easy to comprehend the details. Dissemination of malware information among users of the Internet and also training them to correctly use anti-malware products are crucial to protecting users from the malware onslaught. This paper will provide an exhaustive bibliography of methods to assist in combating malware.
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Link to ePress publication
DOI
10.1109/PST.2016.7906998.
Copyright holder
Authors
Copyright notice
All rights reserved
Copyright license
Available online at
This item appears in: