Survey on representation techniques for malware detection system

Malicious programs are malignant software’s designed by hackers or cyber offenders with a harmful intent to disrupt computer operation. In various researches, we found that the balance between designing an accurate architecture that can detect the malware and track several advanced techniques that m...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohamed, Gamal Abdel Nassir, Ithnin, Norafida
Format: Article
Language:English
Published: Science Publications 2017
Subjects:
Online Access:http://eprints.utm.my/id/eprint/80729/1/NorafidaIthnin2017_SurveyonRepresentationTechniquesforMalwareDetection.pdf
http://eprints.utm.my/id/eprint/80729/
https://dx.doi.org/10.3844/ajassp.2017.1049.1069
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
Description
Summary:Malicious programs are malignant software’s designed by hackers or cyber offenders with a harmful intent to disrupt computer operation. In various researches, we found that the balance between designing an accurate architecture that can detect the malware and track several advanced techniques that malware creators apply to get variants of malware are always a difficult line. Hence the study of malware detection techniques has become more important and challenging within the security field. This review paper provides a detailed discussion and full reviews for various types of malware, malware detection techniques, various researches on them, malware analysis methods and different dynamic programmingbased tools that could be used to represent the malware sampled. We have provided a comprehensive bibliography in malware detection, its techniques and analysis methods for malware researchers.