Evolution of Malware and Its Detection Techniques

33Citations
Citations of this article
77Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In today’s world, information is one of the most valuable assets, but there is a major threat to it by the evolving second-generation sophisticated malware, because it can enter the networks, quietly take the confidential data/information from the computational devices, and can cripple the infrastructures, etc. To detect these malware, time-to-time various techniques are proposed. These methods range from the early day signature-based detection to machine/deep learning techniques. Therefore, to understand the evolution of malware and its detection technique, this paper presents an overview of the evolution of malware and it’s detection techniques. It discusses in details the various type of second-generation malware and the popular detection techniques used to detect it, viz. signature matching, heuristic methods, normalization, and machine/deep learning techniques.

Cite

CITATION STYLE

APA

Sahay, S. K., Sharma, A., & Rathore, H. (2020). Evolution of Malware and Its Detection Techniques. In Advances in Intelligent Systems and Computing (Vol. 933, pp. 139–150). Springer Verlag. https://doi.org/10.1007/978-981-13-7166-0_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free