Survey on Malware and Rootkit Detection
Aswana Lal1 , M. Azath2 , Miss Sony3
Section:Survey Paper, Product Type: Journal Paper
Volume-3 ,
Issue-1 , Page no. 39-42, Jan-2015
Online published on Jan 31, 2015
Copyright © Aswana Lal, M. Azath , Miss Sony . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: Aswana Lal, M. Azath , Miss Sony, “Survey on Malware and Rootkit Detection,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.1, pp.39-42, 2015.
MLA Citation
MLA Style Citation: Aswana Lal, M. Azath , Miss Sony "Survey on Malware and Rootkit Detection." International Journal of Computer Sciences and Engineering 3.1 (2015): 39-42.
APA Citation
APA Style Citation: Aswana Lal, M. Azath , Miss Sony, (2015). Survey on Malware and Rootkit Detection. International Journal of Computer Sciences and Engineering, 3(1), 39-42.
BibTex Citation
BibTex Style Citation:
@article{Lal_2015,
author = {Aswana Lal, M. Azath , Miss Sony},
title = {Survey on Malware and Rootkit Detection},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2015},
volume = {3},
Issue = {1},
month = {1},
year = {2015},
issn = {2347-2693},
pages = {39-42},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=358},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=358
TI - Survey on Malware and Rootkit Detection
T2 - International Journal of Computer Sciences and Engineering
AU - Aswana Lal, M. Azath , Miss Sony
PY - 2015
DA - 2015/01/31
PB - IJCSE, Indore, INDIA
SP - 39-42
IS - 1
VL - 3
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
2984 | 2758 downloads | 2821 downloads |




Abstract
Malwares are malicious software, designed to damage computer systems without the knowledge of the owner. Rootkit is also malicious software which hides the existence of certain processes or programs from normal methods of detection and enables continued privileged access to a computer. Now a day the impact of malware and rootkit is getting worst. Their detection is difficult because malicious program may be able to subvert the software that is intended to find it. Detection methods uses an alternative and trusted operating system, signature scanning behavioral-based methods, difference scanning, and memory dump analysis etc. Malware and rootkit detectors are the primary tools in defense against malicious programs. The quality of such a detector is determined by the techniques used by it. There are mainly two types of techniques to detect the malwares, signature based and anomaly based techniques. Signature-based detection is a malware detection approach that identifies a malware instance by the presence of at least one byte code pattern present in a database of signatures from known malicious programs. If a program contains a pattern that already exists within the database, it is deemed. In anomaly based detection malwares are classified according to some heuristics and rules. This survey study about signature based and anomaly based malware detection and list their strengths and limitations. It also compares techniques and helps to choose a desirable technique for secure system.
Key-Words / Index Term
Anomaly based malware, rootkit, malware detection malcode, malicious code, malicious software, signature-based, behavior based
References
[1]https://www.cert.gov.uk/wpcontent/uploads/2014/08/An-introduction-to malware.pdf
[2]http://www.ukessays.com/essays/computer-science/the-introduction-to-malicious-software-computer-science-essay.php
[3]http://en.wikipedia.org/wiki/Computer_virus
[4]http://en.wikipedia.org/wiki/Computer_worm
[5]http://en.wikipedia.org/wiki/Trojan_horse_(computing)
[6]” Survey on Malware Detection Methods” Vinod P. Department of Computer Engineering, Malaviya National Institute of Technology, Jaipur, Rajasthan
[7]“A Survey of Malware Detection Techniques”NwokediIdika,AdityaPMathur.Department of Computer Science Purdue University, West Lafayette, IN 47907.
[8]” A Survey on Techniques in Detection and Analyzing Malware Executables” Kirti Mathur M.Tech. Scholar, Department of CSE Rajasthan Technical University, India.
[9]“A Specification-based Intrusion Detection System for AODV” Chin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko,Rattapon Limprasittiporn,Jeff Rowe,Karl Levitt,Computer Security Laboratory University of California, Davis.
[10]http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.7174
[11] Greoigre Jacob,Herve Debar,Eric Fillol,”Behavioral detection of malware:from a survey towards an established taxonomy”,Springer-Verlag France 2008