Open Access   Article Go Back

Survey on Malware and Rootkit Detection

Aswana Lal1 , M. Azath2 , Miss Sony3

Section:Survey Paper, Product Type: Journal Paper
Volume-3 , Issue-1 , Page no. 39-42, Jan-2015

Online published on Jan 31, 2015

Copyright © Aswana Lal, M. Azath , Miss Sony . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Aswana Lal, M. Azath , Miss Sony, “Survey on Malware and Rootkit Detection,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.39-42, 2015.

MLA Style Citation: Aswana Lal, M. Azath , Miss Sony "Survey on Malware and Rootkit Detection." International Journal of Computer Sciences and Engineering 3.1 (2015): 39-42.

APA Style Citation: Aswana Lal, M. Azath , Miss Sony, (2015). Survey on Malware and Rootkit Detection. International Journal of Computer Sciences and Engineering, 3(1), 39-42.

BibTex Style Citation:
@article{Lal_2015,
author = {Aswana Lal, M. Azath , Miss Sony},
title = {Survey on Malware and Rootkit Detection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2015},
volume = {3},
Issue = {1},
month = {1},
year = {2015},
issn = {2347-2693},
pages = {39-42},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=358},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=358
TI - Survey on Malware and Rootkit Detection
T2 - International Journal of Computer Sciences and Engineering
AU - Aswana Lal, M. Azath , Miss Sony
PY - 2015
DA - 2015/01/31
PB - IJCSE, Indore, INDIA
SP - 39-42
IS - 1
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2824 2606 downloads 2608 downloads
  
  
           

Abstract

Malwares are malicious software, designed to damage computer systems without the knowledge of the owner. Rootkit is also malicious software which hides the existence of certain processes or programs from normal methods of detection and enables continued privileged access to a computer. Now a day the impact of malware and rootkit is getting worst. Their detection is difficult because malicious program may be able to subvert the software that is intended to find it. Detection methods uses an alternative and trusted operating system, signature scanning behavioral-based methods, difference scanning, and memory dump analysis etc. Malware and rootkit detectors are the primary tools in defense against malicious programs. The quality of such a detector is determined by the techniques used by it. There are mainly two types of techniques to detect the malwares, signature based and anomaly based techniques. Signature-based detection is a malware detection approach that identifies a malware instance by the presence of at least one byte code pattern present in a database of signatures from known malicious programs. If a program contains a pattern that already exists within the database, it is deemed. In anomaly based detection malwares are classified according to some heuristics and rules. This survey study about signature based and anomaly based malware detection and list their strengths and limitations. It also compares techniques and helps to choose a desirable technique for secure system.

Key-Words / Index Term

Anomaly based malware, rootkit, malware detection malcode, malicious code, malicious software, signature-based, behavior based

References

[1]https://www.cert.gov.uk/wpcontent/uploads/2014/08/An-introduction-to malware.pdf
[2]http://www.ukessays.com/essays/computer-science/the-introduction-to-malicious-software-computer-science-essay.php
[3]http://en.wikipedia.org/wiki/Computer_virus
[4]http://en.wikipedia.org/wiki/Computer_worm
[5]http://en.wikipedia.org/wiki/Trojan_horse_(computing)
[6]” Survey on Malware Detection Methods” Vinod P. Department of Computer Engineering, Malaviya National Institute of Technology, Jaipur, Rajasthan
[7]“A Survey of Malware Detection Techniques”NwokediIdika,AdityaPMathur.Department of Computer Science Purdue University, West Lafayette, IN 47907.
[8]” A Survey on Techniques in Detection and Analyzing Malware Executables” Kirti Mathur M.Tech. Scholar, Department of CSE Rajasthan Technical University, India.
[9]“A Specification-based Intrusion Detection System for AODV” Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko,Rattapon Limprasittiporn,Jeff Rowe,Karl Levitt,Computer Security Laboratory University of California, Davis.
[10]http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.7174
[11] Greoigre Jacob,Herve Debar,Eric Fillol,”Behavioral detection of malware:from a survey towards an established taxonomy”,Springer-Verlag France 2008