Open Access   Article Go Back

Malwares : Creation and Avoidance

Durganath Rajesh1 , Adnaan Arbaaz Ahmed2 , M.I. Thariq Hussan3 , Venkateswarlu Bollapalli4

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 179-183, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.179183

Online published on Apr 30, 2019

Copyright © Durganath Rajesh, Adnaan Arbaaz Ahmed, M.I. Thariq Hussan, Venkateswarlu Bollapalli . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Durganath Rajesh, Adnaan Arbaaz Ahmed, M.I. Thariq Hussan, Venkateswarlu Bollapalli, “Malwares : Creation and Avoidance,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.179-183, 2019.

MLA Style Citation: Durganath Rajesh, Adnaan Arbaaz Ahmed, M.I. Thariq Hussan, Venkateswarlu Bollapalli "Malwares : Creation and Avoidance." International Journal of Computer Sciences and Engineering 7.4 (2019): 179-183.

APA Style Citation: Durganath Rajesh, Adnaan Arbaaz Ahmed, M.I. Thariq Hussan, Venkateswarlu Bollapalli, (2019). Malwares : Creation and Avoidance. International Journal of Computer Sciences and Engineering, 7(4), 179-183.

BibTex Style Citation:
@article{Rajesh_2019,
author = {Durganath Rajesh, Adnaan Arbaaz Ahmed, M.I. Thariq Hussan, Venkateswarlu Bollapalli},
title = {Malwares : Creation and Avoidance},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {179-183},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4014},
doi = {https://doi.org/10.26438/ijcse/v7i4.179183}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.179183}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4014
TI - Malwares : Creation and Avoidance
T2 - International Journal of Computer Sciences and Engineering
AU - Durganath Rajesh, Adnaan Arbaaz Ahmed, M.I. Thariq Hussan, Venkateswarlu Bollapalli
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 179-183
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
683 312 downloads 183 downloads
  
  
           

Abstract

In today’s world, hackers are improvising their various techniques for creating a malware which is usually a malicious software product. These malwares are basically created by hackers and it happens mostly in parts of Russia and Europe. Hackers usually use malicious software or malware to attack victims and enable multiple forms of cyber security. On the other hand, the developers establish different techniques to produce anti-malware systems with effective detection methods for protection on computers. This paper relates with the creation of malware by “Darkcomet RAT-v5.3”. A detailed survey has been conducted on the current status of malware creation and infection and efforts are made to improve anti-malware or malware detection systems.

Key-Words / Index Term

Malwares, hackers, security, malware detection

References

[1] Fan Wu, Hira Narang, Dwayne Clarke. (2014). An Overview of Mobile Malware and Solutions, Journal of Computer and Communications.
[2] Hieu Le Thanh. (2013). Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It, Journal of Information Security.
[3] Saja Alqurashi, Omar Batarfi. (2016). A Comparison of Malware Detection Techniques Based on Hidden Markov Model, Journal of Information Security.
[4] Ekta Gandotra, Divya Bansal, Sanjeev Sofat. (2014). Malware Analysis and Classification: A Survey, Journal of Information Security.
[5] BelalAmro. (2018). Phishing Techniques in Mobile Devices, Journal of Computer and Communications.
[6] Espoir K. Kabanga, Chang Hoon Kim. (2017). Malware Images Classification Using Convolutional Neural Network, Journal of Computer and Communications.