Taxonomy of malware detection techniques

Loading...
Thumbnail Image

Supplementary material

Other Title

Authors

Mohaddes Deylami, Hanif
Muniyandi, R.C.
Ardekani, Iman
Sarrafzadeh, Hossein

Author ORCID Profiles (clickable)

Degree

Grantor

Date

2016-12

Supervisors

Type

Conference Contribution - Paper in Published Proceedings

Ngā Upoko Tukutuku (Māori subject headings)

Keyword

malware
malicious code
taxonomy
anomaly-based
signature based
system requirements
intrusion detection systems (IDS)

ANZSRC Field of Research Code (2020)

Citation

Mohaddes Deylami, H., Muniyandi, R. C., Ardekani, I. T., , & Sarrafzadeh, H. (2016, December). Taxonomy of malware detection techniques. IEEE Xplore (Ed.), 016 14th Annual Conference on Privacy, Security and Trust (PST) (pp.629-636). 10.1109/PST.2016.7906998.

Abstract

Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends on the technology used. Therefore, it is paramount that the advantages and disadvantages of each type of technology are scrutinized analytically. This study’s aim is to scrutinize existing publications on this subject and to follow the trend that has taken place in the advancement and development with reference to the amount of information and sources of such literature. Many of the malware programs are huge and complicated and it is not easy to comprehend the details. Dissemination of malware information among users of the Internet and also training them to correctly use anti-malware products are crucial to protecting users from the malware onslaught. This paper will provide an exhaustive bibliography of methods to assist in combating malware.

Publisher

Institute of Electrical and Electronics Engineers (IEEE)

Link to ePress publication

DOI

10.1109/PST.2016.7906998.

Copyright holder

Authors

Copyright notice

All rights reserved

Copyright license

Available online at

This item appears in: