Open Access Open Access  Restricted Access Subscription Access

A Survey of Various Malware Detection Techniques


Affiliations
1 Department of Computer Engineering, Patiala, India
 

In this paper number of techniques have been reviewed that are used for malware detection. Any harmful computer program which performs the undesirable action without the consent of user is called malware. It may be virus, worm, spyware, backdoor, Trojan horse etc. Malware plays the main threat in the computer security and increasing day by day. With the evolutions malware becoming more strong i.e. changing its signature and behavior dynamically so it is difficult to detect them. Numerous techniques have been developed to detect malware. All have some advantages and disadvantages. Signature based detection; Anomaly based detection, Heuristic based and artificial immune system based. Most antivirus used the signature based detection and it used for the signature of known malware which can't detect unknown malware. To overcome this shortcoming behavioral based detection is used, which find the behavior of the program and identified that is it benign or malware. Data mining and machine learning methods are used by heuristic malware detection. Artificial immune system is just like biological immune system that provides the protection to system by differentiating between self and non self particles.

Keywords

Malware Detection, Artificial Immune System, Benign, Signature, Heuristic.
User
Notifications
Font Size

Abstract Views: 203

PDF Views: 9




  • A Survey of Various Malware Detection Techniques

Abstract Views: 203  |  PDF Views: 9

Authors

Kuldeep Singh
Department of Computer Engineering, Patiala, India
Lakhwinder Kaur
Department of Computer Engineering, Patiala, India

Abstract


In this paper number of techniques have been reviewed that are used for malware detection. Any harmful computer program which performs the undesirable action without the consent of user is called malware. It may be virus, worm, spyware, backdoor, Trojan horse etc. Malware plays the main threat in the computer security and increasing day by day. With the evolutions malware becoming more strong i.e. changing its signature and behavior dynamically so it is difficult to detect them. Numerous techniques have been developed to detect malware. All have some advantages and disadvantages. Signature based detection; Anomaly based detection, Heuristic based and artificial immune system based. Most antivirus used the signature based detection and it used for the signature of known malware which can't detect unknown malware. To overcome this shortcoming behavioral based detection is used, which find the behavior of the program and identified that is it benign or malware. Data mining and machine learning methods are used by heuristic malware detection. Artificial immune system is just like biological immune system that provides the protection to system by differentiating between self and non self particles.

Keywords


Malware Detection, Artificial Immune System, Benign, Signature, Heuristic.