In today’s world, information is one of the most valuable assets, but there is a major threat to it by the evolving second-generation sophisticated malware, because it can enter the networks, quietly take the confidential data/information from the computational devices, and can cripple the infrastructures, etc. To detect these malware, time-to-time various techniques are proposed. These methods range from the early day signature-based detection to machine/deep learning techniques. Therefore, to understand the evolution of malware and its detection technique, this paper presents an overview of the evolution of malware and it’s detection techniques. It discusses in details the various type of second-generation malware and the popular detection techniques used to detect it, viz. signature matching, heuristic methods, normalization, and machine/deep learning techniques.
CITATION STYLE
Sahay, S. K., Sharma, A., & Rathore, H. (2020). Evolution of Malware and Its Detection Techniques. In Advances in Intelligent Systems and Computing (Vol. 933, pp. 139–150). Springer Verlag. https://doi.org/10.1007/978-981-13-7166-0_14
Mendeley helps you to discover research relevant for your work.