Comprehensive Review of Malware Detection Techniques

被引:0
|
作者
Inayat, Usman [1 ]
Zia, Muhammad Fahad [2 ]
Ali, Fahad [1 ]
Ali, Syed Moshin [1 ]
Khan, Hafiz Muhammad Ashja [1 ]
Noor, Wafa [1 ]
机构
[1] Univ Management & Technol, Lahore, Pakistan
[2] Natl Univ Comp & Emerging Sci, Lahore, Pakistan
关键词
Malware; virus; signature-based detection; anomaly-based detection; security; TAXONOMY;
D O I
10.1109/ICIC53490.2021.9693072
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
If we focus on the attacks of smartphones and computer systems, various malware or malicious codes are set up regularly about which our users are unaware. These program authors intend to steal sensitive information either secretly or openly to prove their capabilities or competence. To counter these malwares, traditional anomaly-based and signature-based detection techniques are applied. Although, static methods can block the known malware. But to intercept new ones is not possible with these techniques. However, dynamic techniques are used to run the executable on the virtual environment and by anti-malware software. High consumption of the resources and the scanning for an extended period are the main drawbacks of this technique. The third technique which is being utilized is called the hybrid detection technique that is the combination of both static and dynamic techniques. Malware threats and detection methods are discussed in this review paper with the comparison table of all malware threats with their detection techniques.
引用
收藏
页码:677 / 682
页数:6
相关论文
共 50 条
  • [31] Comparing Machine Learning Techniques for Malware Detection
    Moubarak, Joanna
    Feghali, Tony
    [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 844 - 851
  • [32] Comparative Analysis of Android Malware Detection Techniques
    Painter, Nishant
    Kadhiwala, Bintu
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 2, 2017, 469 : 131 - 139
  • [33] Malware Detection Techniques Based on Deep Learning
    Sreekumari, Prasanthi
    [J]. 2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 65 - 70
  • [34] IoT malware detection using static and dynamic analysis techniques: A systematic literature review
    Kumar, Sumit
    Ahlawat, Prachi
    Sahni, Jyoti
    [J]. SECURITY AND PRIVACY, 2024,
  • [35] A systematic literature review on Windows malware detection: Techniques, research issues, and future directions
    Maniriho, Pascal
    Mahmood, Abdun Naser
    Chowdhury, Mohammad Jabed Morshed
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2024, 209
  • [36] Multimedia Tampering Detection: A Comprehensive Review of Available Techniques and Solutions
    Tripathi, Gautami
    Ahad, Mohd Abdul
    Haq, Zeeshan Ali
    [J]. ADVANCES IN BIOINFORMATICS, MULTIMEDIA, AND ELECTRONICS CIRCUITS AND SIGNALS, 2020, 1064 : 223 - 235
  • [37] Anomaly detection and defense techniques in federated learning: a comprehensive review
    Zhang, Chang
    Yang, Shunkun
    Mao, Lingfeng
    Ning, Huansheng
    [J]. ARTIFICIAL INTELLIGENCE REVIEW, 2024, 57 (06)
  • [38] Ventricular Fibrillation Prediction and Detection: A Comprehensive Review of Modern Techniques
    Fira, Monica
    Costin, Hariton-Nicolae
    Goraș, Liviu
    [J]. Applied Sciences (Switzerland), 2024, 14 (23):
  • [39] Conventional and advanced detection techniques of foodborne pathogens: A comprehensive review
    Kabiraz, Meera Probha
    Majumdar, Priyanka Rani
    Mahmud, M. M. Chayan
    Bhowmik, Shuva
    Ali, Azam
    [J]. HELIYON, 2023, 9 (04)
  • [40] A comprehensive review and assessment of islanding detection techniques for PV systems
    Alobaid M.
    Abo-Khalil A.G.
    [J]. International Journal of Thermofluids, 2023, 18