Back close

A framework for dynamic malware analysis based on behavior artifacts

Publication Type : Journal Article

Thematic Areas : TIFAC-CORE in Cyber Security

Publisher : Advances in Intelligent Systems and Computing

Source : Advances in Intelligent Systems and Computing, Springer Verlag, Volume 515, p.551-559 (2017)

Url :

ISBN : 9789811031526

Keywords : Back doors, Comparative studies, Computation theory, Computer crime, Computer viruses, Computer worms, Cuckoo sandbox, Dynamic malware analysis, features extraction, Intelligent computing, Learning systems, malware, Malware analysis, Malware detection, OR-networks, Static analysis

Campus : Amritapuri, Coimbatore

School : Centre for Cybersecurity Systems and Networks, School of Engineering

Center : TIFAC CORE in Cyber Security

Department : Computer Science, cyber Security

Year : 2017

Abstract : Malware stands for malicious software. Any file that causes damage to the computer or network can be termed as malicious. For malware analysis, there are two fundamental approaches: static analysis and dynamic analysis. The static analysis focuses on analyzing the file without executing, whereas dynamic analysis means analyzing or observing its behavior while it is being executed. While performing malware analysis, we have to classify malware samples. The different types of malware include worm, virus, rootkit, trojan horse, back door, botnet, ransomware, spyware, adware, and logic bombs. In this paper, our objective is to have a breakdown of techniques used for malware analysis and a comparative study of various malware detection/classification systems. © Springer Nature Singapore Pte Ltd. 2017.

Cite this Research Publication : T. G. Gregory Paul and Dr. Gireesh K. T., “A framework for dynamic malware analysis based on behavior artifacts”, Advances in Intelligent Systems and Computing, vol. 515, pp. 551-559, 2017.

Admissions Apply Now