Malware Essay

Decent Essays
Abstract—Malware is a sequence of instructions that has the potential to harm any computer system or computer network. Thus detecting malware especially new ones is a critical topic in today’s software security profession. Traditional signature based detection performs well against known malicious programs but can’t deal with new ones where signatures are not available. Furthermore, this approach is generally regarded as ineffective against attacks like code polymorphism and metamorphism used by malware writers to obfuscate their code. To overcome this problem new techniques have been developed using data mining and machine learning. In this paper we present a new framework to detect new malicious programs, it’s based on N-grams and an improved …show more content…
The history of malware began with Computer Virus, a term first introduced by Cohen [19]. Malware can be defined according to McGraw and Morisett [16] as any code added, changed, or removed from a software system to intentionally cause harm or subvert the system’s intended function. Other definitions was proposed by commercial anti-malware companies, which describe malware as software designed to delete, block, modify or copy data, or disrupt the performance of computers or computer networks. Based on their particular actions, malware can be categorized into groups and subgroups that can …show more content…
Rootkits are extremely difficult to detect and eradicate since they are typically installed into low level system resources. Because of this, Rootkits often go undetected by conventional anti-virus software.
Many factors favor the spread of malware such as the growth of Internet, the advent of social networks, the vulgarization of smart devices, the increasing use of storage media, etc. Malware causes many damages to computer and networks, according to [23] over 390,000 new malicious programs appear every day. Moreover a recent threat report published [12], states that the release rate of malicious code and other unwanted programs may be exceeding that of legitimate software

Related Documents

  • Improved Essays

    This dataset contains 68 compressed pcap files each containing one hour of traces. The total size of the dataset is 69 GB. The dataset from university of Georgia consists of ZeroAccess and Skynet botnet traces. The ZeroAccess is one of the most prominent P2P botnet in the recent years.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Bsc300 Unit 1 Assignment 2

    • 2191 Words
    • 9 Pages

    ASSIGNMENT 2 AUTHOR: ALI AKBAR MIT111558 SUBMITTED TO: MS NAVNEET KAUR Contents Mobile Apps 2 Introduction 2 Vulnerabilities 2 Android main risk: 3 Security vulnerabilities: 4 Bad data storage: 4 Malware: 4 Unauthorized access: 5 Lack of encryption: 5 Data leaks from syncing: 6 Preventive methods for vulnerability: 6 Experience trust product. 6 Work with software reputation service. 7 Layer security.…

    • 2191 Words
    • 9 Pages
    Great Essays
  • Improved Essays

    Threat Assessment of ‘Important Security Alert From Windows’ Pop-Ups: ‘Important Security Alert From Windows’ Pop-Ups has created havoc among computer users that does not allow them to usually work in the computer. Where this adware has found its own method to attack the targeted system and to make the infected computer almost useless. In order to trouble computer user, it performs several malicious activities to use the security gaps in the system and it leads to freeze the entire running programs of the computer. Firstly, this malware program affect the processing speed of the infected computer to stop the basic functions of the system so that the computer will respond very slowly when user give any instructions.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Please research one virus and one worm, and write a maximum 2-page single-spaced paper explaining what each of them is, what they do, what their impact was, what the mechanics of how they work are (the technical aspect), and how were they stopped. Computer virus: It is a piece of code which is loaded onto the computer without the user knowledge and runs itself. When this code is executed, it makes a copy of itself and inserts this copy into another computer programs, data files of the hard drive. Such small virus also steals hard disk space and CPU time , corrupts data.…

    • 1405 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy (Malware). Malware is able to accomplish this by its works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The type of malware that could be used is a Rootkit Malware. A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable.…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Managing Threats to Data Common threats to data consist of Botnets, DDoS (Distributed denial of service), Hacking, etc. You can manage and prevent data threats with antivirus/malware/hacking/etc software. By downloading a legitimate program you can protect your computers data. The software will alert you if there is something out of place in your computer before it’s too late, so you can get it removed.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Now, the rate of zero-day and unknown malware is massive. From 2013 to 2014, new malware jumped just over 71 percent from 83M to 142M, according to AV-Test, an independent service provider of anti-virus research. And, more malware was found in the past two years than in the previous 10 years combined. During 2014, Check Point analyzed more than 3,000 gateways and found that 41 percent of Organizations downloaded at least one infected file with unknown malware—almost a 25 percent increase from the previous year. Known Malware…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Internal Bot If an attacker is attempting to breach the enterprise, they may attempt to insert a bot within the network which will wreak havoc on the organization’s system. The internal bot addresses security at the perimeter of the enterprise. The DPI (deep packet inspection) engine will identify network malware that’s attempting to penetrate the network.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Technical Paper – Honeypot IT-548-Q1088 Information Security Submitted by Anudeep Gali Professor: Dr. Derek Holbert Southern New Hampshire University Abstract: Internet is one of the useful resources to the mankind but on the other hand possess so many threats and provides a means of attack for the Intruders. In this project we will be building a secure shell Honeypot and deploy on a public server to research the cyber attacks. Once we deploy the system, we will concentrate on recording all the attempts made by the intruder to enter the information system. We will be able to analyze the most commonly used usernames and passwords and analyze the shell commands used by the intruders to develop remedies of attacks on the original…

    • 1226 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    The authorities also have to opportunity to charge Hammad Akabr and other commercial spyware makers alike, with “file conspiracy charges under the Computer Fraud and Abuse Act or use the Stored Communications Act, in situations where stolen data isn’t intercepted in real time. However Zetter also explains how criminal liability and consequences for the sellers of spyware depend on the overall extent and usage of the produced spyware program along with how the program makers market the…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Introduction In 2017, there have been several high profile cyber-attacks that have affected various systems across the country and the world. Among these cyber-criminals is the group known as the Shadow Brokers who debuted in August 2016 after claiming to have breached the spy tools of the Equation Group, an elite NSA-linked operation. In April 2017, the Shadow Brokers released what is said to be significant NSA tools which individuals have used to infect computer systems with ransomware. As a result of the Shadow Brokers’ breach, one strain of ransomware, WannaCry, spread worldwide in May 2017 hitting several targets that included public utilities and large corporations. It even attacked National Health Service facilities in Great Britain,…

    • 657 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 2 Lab 1

    • 618 Words
    • 3 Pages

    Lab 2: OSI Model Introduction: This lab expanded upon the first, by outlining in greater depth, the Open Systems Interconnect (OSI) Reference Model. In particular, we covered how this model shapes and forms the key structure of all computer network communication. Covered in the first lab, the layers involved are physical, data link, network, transport, session, presentation and application. The lab portrayed the flow information traffic as movement through a series of ports, similar to entering doors of houses owned by other people.…

    • 618 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays

Related Topics