All About Malwares (Malicious Codes)
نویسندگان
چکیده
Malware, short term for malicious software, is a software which is developed to penetrate computers in a network without the user’s permission or notification. Malware is a common term for a variety type of malicious software. In general, Malwares include Worm, Botnet, virus, Trojan horse, Backdoor, Rootkit, Logic bomb, Rabbit and Spyware. Despite many works that have been done in the area of Malware, still there is not any distinct classification which differentiates different kind of Malwares and explains each of them thoroughly. In this paper, we define each of them in detail and emphasize their differences. We also conclude our studies in this area with providing a diagram which gives a comprehensive overview about Malware. Among the diverse forms of malware, botnet and worm are the most widespread and serious threat which occur commonly in today‘s cyber attacks. Therefore, we concentrate more on them and their communication topologies.
منابع مشابه
Enhancing Accuracy of Android Malware Detection using Intent Instrumentation
Event-driven actions in Android malwares and complexity of extracted profiles of applications’ behaviors are two challenges in dynamic malware analysis tools to find malicious behaviors. Thanks to ability of eventdriven actions in Android applications, malwares can trigger their malicious behaviors at specific conditions and evade from detection. In this paper, we propose a framework for instru...
متن کاملAn Expert Anti - Malware Detection System
144 Abstract: The malware expert system is an enhance approach for analyzing malware and other kinds of software. So, it is necessary to develop an effective malware expert system that can analyze, detect, classify and remove the malware codes. This system is necessary because it removes the errors done by human intervention in determining whether the files to be scanned contain any malicious d...
متن کاملA Categorical Treatment of Malicious Behavioral Obfuscation
This paper studies malicious behavioral obfuscation through the use of a new abstract model for process and kernel interactions based on monoidal categories. In this model, program observations are considered to be finite lists of system call invocations. In a first step, we show how malicious behaviors can be obfuscated by simulating the observations of benign programs. In a second step, we sh...
متن کاملریسک سنج: ابزاری برای سنجش دقیق میزان ریسک امنیتی برنامهها در دستگاههای همراه
Nowadays smartphones and tablets are widely used due to their various capabilities and features for end users. In these devices, accessing a wide range of services and sensitive information including private personal data, contact list, geolocation, sending and receiving messages, accessing social networks and etc. are provided via numerous application programs. These types of accessibilities, ...
متن کاملInvestigating and Analyzing Malicious Events in Android Application
Smart mobile devices have been widely used and the contained sensitive information is endangered by malware events and codes. The malicious events caused by malwares are crucial evidences for digital forensic analysis, and the main task of mobile forensic analysis is to find the malicious codes and reconstruct these events. However, the reconstruction heavily relies on the code analysis of the ...
متن کامل