International Journal of Advance Computational Engineering and Networking (IJACEN)
.
Follow Us On :
current issues
Volume-12,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-11,Issue-12  ( Dec, 2023 )
  2. Volume-11,Issue-11  ( Nov, 2023 )
  3. Volume-11,Issue-10  ( Oct, 2023 )
  4. Volume-11,Issue-9  ( Sep, 2023 )
  5. Volume-11,Issue-8  ( Aug, 2023 )
  6. Volume-11,Issue-7  ( Jul, 2023 )
  7. Volume-11,Issue-6  ( Jun, 2023 )
  8. Volume-11,Issue-5  ( May, 2023 )
  9. Volume-11,Issue-4  ( Apr, 2023 )
  10. Volume-11,Issue-3  ( Mar, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 133
Paper Published : 1552
No. of Authors : 4025
  Journal Paper


Paper Title :
Study And Analysis Of Various Approaches For Malware Detection And Identification

Author :G. Hamsa, Deepti Vidyarthi

Article Citation :G. Hamsa ,Deepti Vidyarthi , (2013 ) " Study And Analysis Of Various Approaches For Malware Detection And Identification " , International Journal of Advance Computational Engineering and Networking (IJACEN) , pp. 37-43, Volume-1,Issue-10

Abstract : There is a continuous ever-growing arm race between the security defenders and the malware writers in introducing new techniques of malware detection and its evasion. Any new technique introduced and adopted by the anti-malware community is immediately responded by an effective evasion technique by the malware community. Understanding the pros and cons of various approaches of malware detection and identification is very essential to win the arm race. Each approach suffers specific evasion technique but at the same time has its own benefits too. A technique which uses a combination of approaches that complement each other by bringing out the detection capability of an approach and nullifying the evasion techniques of another will best suit today’s need of security. The paper studies and analyses various techniques used for malware detection and identification. It categorizes the malware detection techniques into four quadrants based on the basic approach they adopt. It reflects upon each of these categories and their effectiveness so that a combined, more effective approach of malware detection might be found out.

Type : Research paper

Published : Volume-1,Issue-10


DOIONLINE NO - IJACEN-IRAJ-DOIONLINE-114   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 30
| Published on 2014-01-18
   
   
IRAJ Other Journals
IJACEN updates
Paper Submission is open now for upcoming Issue.
The Conference World

JOURNAL SUPPORTED BY