Survey on representation techniques for malware detection system

Malicious programs are malignant software’s designed by hackers or cyber offenders with a harmful intent to disrupt computer operation. In various researches, we found that the balance between designing an accurate architecture that can detect the malware and track several advanced techniques that m...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohamed, Gamal Abdel Nassir, Ithnin, Norafida
Format: Article
Language:English
Published: Science Publications 2017
Subjects:
Online Access:http://eprints.utm.my/id/eprint/80729/1/NorafidaIthnin2017_SurveyonRepresentationTechniquesforMalwareDetection.pdf
http://eprints.utm.my/id/eprint/80729/
https://dx.doi.org/10.3844/ajassp.2017.1049.1069
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Language: English
id my.utm.80729
record_format eprints
spelling my.utm.807292019-06-27T06:20:49Z http://eprints.utm.my/id/eprint/80729/ Survey on representation techniques for malware detection system Mohamed, Gamal Abdel Nassir Ithnin, Norafida QA75 Electronic computers. Computer science Malicious programs are malignant software’s designed by hackers or cyber offenders with a harmful intent to disrupt computer operation. In various researches, we found that the balance between designing an accurate architecture that can detect the malware and track several advanced techniques that malware creators apply to get variants of malware are always a difficult line. Hence the study of malware detection techniques has become more important and challenging within the security field. This review paper provides a detailed discussion and full reviews for various types of malware, malware detection techniques, various researches on them, malware analysis methods and different dynamic programmingbased tools that could be used to represent the malware sampled. We have provided a comprehensive bibliography in malware detection, its techniques and analysis methods for malware researchers. Science Publications 2017 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/80729/1/NorafidaIthnin2017_SurveyonRepresentationTechniquesforMalwareDetection.pdf Mohamed, Gamal Abdel Nassir and Ithnin, Norafida (2017) Survey on representation techniques for malware detection system. American Journal of Applied Sciences, 14 (11). pp. 1049-1069. ISSN 1554-3641 https://dx.doi.org/10.3844/ajassp.2017.1049.1069 DOI:10.3844/ajassp.2017.1049.1069
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Mohamed, Gamal Abdel Nassir
Ithnin, Norafida
Survey on representation techniques for malware detection system
description Malicious programs are malignant software’s designed by hackers or cyber offenders with a harmful intent to disrupt computer operation. In various researches, we found that the balance between designing an accurate architecture that can detect the malware and track several advanced techniques that malware creators apply to get variants of malware are always a difficult line. Hence the study of malware detection techniques has become more important and challenging within the security field. This review paper provides a detailed discussion and full reviews for various types of malware, malware detection techniques, various researches on them, malware analysis methods and different dynamic programmingbased tools that could be used to represent the malware sampled. We have provided a comprehensive bibliography in malware detection, its techniques and analysis methods for malware researchers.
format Article
author Mohamed, Gamal Abdel Nassir
Ithnin, Norafida
author_facet Mohamed, Gamal Abdel Nassir
Ithnin, Norafida
author_sort Mohamed, Gamal Abdel Nassir
title Survey on representation techniques for malware detection system
title_short Survey on representation techniques for malware detection system
title_full Survey on representation techniques for malware detection system
title_fullStr Survey on representation techniques for malware detection system
title_full_unstemmed Survey on representation techniques for malware detection system
title_sort survey on representation techniques for malware detection system
publisher Science Publications
publishDate 2017
url http://eprints.utm.my/id/eprint/80729/1/NorafidaIthnin2017_SurveyonRepresentationTechniquesforMalwareDetection.pdf
http://eprints.utm.my/id/eprint/80729/
https://dx.doi.org/10.3844/ajassp.2017.1049.1069
_version_ 1643658498953707520