3Malware Identification, Analysis and Similarity
Subhradip Debnath1* and Soumyanil Biswas2
1Department of Computer Science, Institute of Engineering and Management, Maulana Abul Kalam Azad University of Technology, Kolkata, West Bengal, India
2Department of Electronics and Communication, Institute of Engineering and Management, Institute of Engineering & Management, Kolkata, West Bengal, India
Abstract
Cyberattacks have grown to a much greater extent in the decades. According to statistics in the year of 2009, 12.4 million attacks were recorded, and recently, in 2018, it has raised up to 812.67 million known cases. To be told, these are only the known cases, and there are many which are unrecorded. Ranging from small cyberattack to large ransomware attacks or to a combination of several sophisticated cyberattacks which consists of advanced exploitation techniques and persistence capability for a long-term intrusion campaigns. However, the common part among all the cyberattacks that have happened so far was the use of malware. To mitigate these attacks, we have to understand the basic structure of malware, working features, and its effects upon the target. This paper provides an in-depth overview on malware types, by analyzing the malware via a process called malware analysis, and other related processes depending on the type of malware. It is actually the process which is conducted just after digital forensics and incident response (DFIR). It is the process of detection of ...
Get Cyber Security and Network Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.