Survey on representation techniques for malware detection system
Malicious programs are malignant software’s designed by hackers or cyber offenders with a harmful intent to disrupt computer operation. In various researches, we found that the balance between designing an accurate architecture that can detect the malware and track several advanced techniques that m...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Science Publications
2017
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/80729/1/NorafidaIthnin2017_SurveyonRepresentationTechniquesforMalwareDetection.pdf http://eprints.utm.my/id/eprint/80729/ https://dx.doi.org/10.3844/ajassp.2017.1049.1069 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
Language: | English |
id |
my.utm.80729 |
---|---|
record_format |
eprints |
spelling |
my.utm.807292019-06-27T06:20:49Z http://eprints.utm.my/id/eprint/80729/ Survey on representation techniques for malware detection system Mohamed, Gamal Abdel Nassir Ithnin, Norafida QA75 Electronic computers. Computer science Malicious programs are malignant software’s designed by hackers or cyber offenders with a harmful intent to disrupt computer operation. In various researches, we found that the balance between designing an accurate architecture that can detect the malware and track several advanced techniques that malware creators apply to get variants of malware are always a difficult line. Hence the study of malware detection techniques has become more important and challenging within the security field. This review paper provides a detailed discussion and full reviews for various types of malware, malware detection techniques, various researches on them, malware analysis methods and different dynamic programmingbased tools that could be used to represent the malware sampled. We have provided a comprehensive bibliography in malware detection, its techniques and analysis methods for malware researchers. Science Publications 2017 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/80729/1/NorafidaIthnin2017_SurveyonRepresentationTechniquesforMalwareDetection.pdf Mohamed, Gamal Abdel Nassir and Ithnin, Norafida (2017) Survey on representation techniques for malware detection system. American Journal of Applied Sciences, 14 (11). pp. 1049-1069. ISSN 1554-3641 https://dx.doi.org/10.3844/ajassp.2017.1049.1069 DOI:10.3844/ajassp.2017.1049.1069 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Mohamed, Gamal Abdel Nassir Ithnin, Norafida Survey on representation techniques for malware detection system |
description |
Malicious programs are malignant software’s designed by hackers or cyber offenders with a harmful intent to disrupt computer operation. In various researches, we found that the balance between designing an accurate architecture that can detect the malware and track several advanced techniques that malware creators apply to get variants of malware are always a difficult line. Hence the study of malware detection techniques has become more important and challenging within the security field. This review paper provides a detailed discussion and full reviews for various types of malware, malware detection techniques, various researches on them, malware analysis methods and different dynamic programmingbased tools that could be used to represent the malware sampled. We have provided a comprehensive bibliography in malware detection, its techniques and analysis methods for malware researchers. |
format |
Article |
author |
Mohamed, Gamal Abdel Nassir Ithnin, Norafida |
author_facet |
Mohamed, Gamal Abdel Nassir Ithnin, Norafida |
author_sort |
Mohamed, Gamal Abdel Nassir |
title |
Survey on representation techniques for malware detection system |
title_short |
Survey on representation techniques for malware detection system |
title_full |
Survey on representation techniques for malware detection system |
title_fullStr |
Survey on representation techniques for malware detection system |
title_full_unstemmed |
Survey on representation techniques for malware detection system |
title_sort |
survey on representation techniques for malware detection system |
publisher |
Science Publications |
publishDate |
2017 |
url |
http://eprints.utm.my/id/eprint/80729/1/NorafidaIthnin2017_SurveyonRepresentationTechniquesforMalwareDetection.pdf http://eprints.utm.my/id/eprint/80729/ https://dx.doi.org/10.3844/ajassp.2017.1049.1069 |
_version_ |
1643658498953707520 |