All About Malwares (Malicious Codes)

نویسندگان

  • Hossein Rouhani Zeidanloo
  • Farzaneh Tabatabaei
  • Payam Vahdani Amoli
  • Atefeh Tajpour
چکیده

Malware, short term for malicious software, is a software which is developed to penetrate computers in a network without the user’s permission or notification. Malware is a common term for a variety type of malicious software. In general, Malwares include Worm, Botnet, virus, Trojan horse, Backdoor, Rootkit, Logic bomb, Rabbit and Spyware. Despite many works that have been done in the area of Malware, still there is not any distinct classification which differentiates different kind of Malwares and explains each of them thoroughly. In this paper, we define each of them in detail and emphasize their differences. We also conclude our studies in this area with providing a diagram which gives a comprehensive overview about Malware. Among the diverse forms of malware, botnet and worm are the most widespread and serious threat which occur commonly in today‘s cyber attacks. Therefore, we concentrate more on them and their communication topologies.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Enhancing Accuracy of Android Malware Detection using Intent Instrumentation

Event-driven actions in Android malwares and complexity of extracted profiles of applications’ behaviors are two challenges in dynamic malware analysis tools to find malicious behaviors. Thanks to ability of eventdriven actions in Android applications, malwares can trigger their malicious behaviors at specific conditions and evade from detection. In this paper, we propose a framework for instru...

متن کامل

An Expert Anti - Malware Detection System

144 Abstract: The malware expert system is an enhance approach for analyzing malware and other kinds of software. So, it is necessary to develop an effective malware expert system that can analyze, detect, classify and remove the malware codes. This system is necessary because it removes the errors done by human intervention in determining whether the files to be scanned contain any malicious d...

متن کامل

A Categorical Treatment of Malicious Behavioral Obfuscation

This paper studies malicious behavioral obfuscation through the use of a new abstract model for process and kernel interactions based on monoidal categories. In this model, program observations are considered to be finite lists of system call invocations. In a first step, we show how malicious behaviors can be obfuscated by simulating the observations of benign programs. In a second step, we sh...

متن کامل

ریسک سنج: ابزاری برای سنجش دقیق میزان ریسک امنیتی برنامه‌ها در دستگاه‌های همراه

Nowadays smartphones and tablets are widely used due to their various capabilities and features for end users. In these devices, accessing a wide range of services and sensitive information including private personal data, contact list, geolocation, sending and receiving messages, accessing social networks and etc. are provided via numerous application programs. These types of accessibilities, ...

متن کامل

Investigating and Analyzing Malicious Events in Android Application

Smart mobile devices have been widely used and the contained sensitive information is endangered by malware events and codes. The malicious events caused by malwares are crucial evidences for digital forensic analysis, and the main task of mobile forensic analysis is to find the malicious codes and reconstruct these events. However, the reconstruction heavily relies on the code analysis of the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010