Reference Hub5
Malware Methodologies and Its Future: A Survey

Malware Methodologies and Its Future: A Survey

Chandan Kumar Behera, D. Lalitha Bhaskari
Copyright: © 2017 |Volume: 11 |Issue: 4 |Pages: 18
ISSN: 1930-1650|EISSN: 1930-1669|EISBN13: 9781522511762|DOI: 10.4018/IJISP.2017100104
Cite Article Cite Article

MLA

Behera, Chandan Kumar, and D. Lalitha Bhaskari. "Malware Methodologies and Its Future: A Survey." IJISP vol.11, no.4 2017: pp.47-64. http://doi.org/10.4018/IJISP.2017100104

APA

Behera, C. K. & Bhaskari, D. L. (2017). Malware Methodologies and Its Future: A Survey. International Journal of Information Security and Privacy (IJISP), 11(4), 47-64. http://doi.org/10.4018/IJISP.2017100104

Chicago

Behera, Chandan Kumar, and D. Lalitha Bhaskari. "Malware Methodologies and Its Future: A Survey," International Journal of Information Security and Privacy (IJISP) 11, no.4: 47-64. http://doi.org/10.4018/IJISP.2017100104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Malware means any unwanted software that performs harmful actions or executes some tasks unauthorized. This includes all harmful programs like virus, worms, Trojan, rootkits, Botnets etc. The numbers of malwares rise exponentially with the increase of the use of digital media. With the enormous usage of internet world wide, the rate of cybercrimes has increased and giving life to many malwares in the cyber space. New technologies and skills should be developed and formulated to fight against malwares with the goals of automatic identification of malwares as well as their families. A lot of research is going on to combat the malwares, but still in vain. In order to design tools to fight against it, a systematic understanding is needed on its various types, behaviors along with different detection and analysis techniques. With all above, this paper summarizes a thorough information regarding malwares, their classification techniques, different obfuscation methods, packing and unpacking concepts along with particular tools.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.