Malwares : Creation and Avoidance
Durganath Rajesh1 , Adnaan Arbaaz Ahmed2 , M.I. Thariq Hussan3 , Venkateswarlu Bollapalli4
Section:Review Paper, Product Type: Journal Paper
Volume-7 ,
Issue-4 , Page no. 179-183, Apr-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i4.179183
Online published on Apr 30, 2019
Copyright © Durganath Rajesh, Adnaan Arbaaz Ahmed, M.I. Thariq Hussan, Venkateswarlu Bollapalli . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Durganath Rajesh, Adnaan Arbaaz Ahmed, M.I. Thariq Hussan, Venkateswarlu Bollapalli, “Malwares : Creation and Avoidance,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.179-183, 2019.
MLA Style Citation: Durganath Rajesh, Adnaan Arbaaz Ahmed, M.I. Thariq Hussan, Venkateswarlu Bollapalli "Malwares : Creation and Avoidance." International Journal of Computer Sciences and Engineering 7.4 (2019): 179-183.
APA Style Citation: Durganath Rajesh, Adnaan Arbaaz Ahmed, M.I. Thariq Hussan, Venkateswarlu Bollapalli, (2019). Malwares : Creation and Avoidance. International Journal of Computer Sciences and Engineering, 7(4), 179-183.
BibTex Style Citation:
@article{Rajesh_2019,
author = {Durganath Rajesh, Adnaan Arbaaz Ahmed, M.I. Thariq Hussan, Venkateswarlu Bollapalli},
title = {Malwares : Creation and Avoidance},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {179-183},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4014},
doi = {https://doi.org/10.26438/ijcse/v7i4.179183}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.179183}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4014
TI - Malwares : Creation and Avoidance
T2 - International Journal of Computer Sciences and Engineering
AU - Durganath Rajesh, Adnaan Arbaaz Ahmed, M.I. Thariq Hussan, Venkateswarlu Bollapalli
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 179-183
IS - 4
VL - 7
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
683 | 312 downloads | 183 downloads |
![](icone_social/Facebook.png)
![](icone_social/Twitter.png)
![](icone_social/Linkedin.png)
![](icone_social/Google+.png)
Abstract
In today’s world, hackers are improvising their various techniques for creating a malware which is usually a malicious software product. These malwares are basically created by hackers and it happens mostly in parts of Russia and Europe. Hackers usually use malicious software or malware to attack victims and enable multiple forms of cyber security. On the other hand, the developers establish different techniques to produce anti-malware systems with effective detection methods for protection on computers. This paper relates with the creation of malware by “Darkcomet RAT-v5.3”. A detailed survey has been conducted on the current status of malware creation and infection and efforts are made to improve anti-malware or malware detection systems.
Key-Words / Index Term
Malwares, hackers, security, malware detection
References
[1] Fan Wu, Hira Narang, Dwayne Clarke. (2014). An Overview of Mobile Malware and Solutions, Journal of Computer and Communications.
[2] Hieu Le Thanh. (2013). Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It, Journal of Information Security.
[3] Saja Alqurashi, Omar Batarfi. (2016). A Comparison of Malware Detection Techniques Based on Hidden Markov Model, Journal of Information Security.
[4] Ekta Gandotra, Divya Bansal, Sanjeev Sofat. (2014). Malware Analysis and Classification: A Survey, Journal of Information Security.
[5] BelalAmro. (2018). Phishing Techniques in Mobile Devices, Journal of Computer and Communications.
[6] Espoir K. Kabanga, Chang Hoon Kim. (2017). Malware Images Classification Using Convolutional Neural Network, Journal of Computer and Communications.