A STATE OF THE ART SURVEY ON POLYMORPHIC MALWARE ANALYSIS AND DETECTION TECHNIQUES

Journal Title: ICTACT Journal on Soft Computing - Year 2018, Vol 8, Issue 4

Abstract

Nowadays, systems are under serious security threats caused by malicious software, commonly known as malware. Such malwares are sophisticatedly created with advanced techniques that make them hard to analyse and detect, thus causing a lot of damages. Polymorphism is one of the advanced techniques by which malware change their identity on each time they attack. This paper presents a detailed systematic and critical review that explores the available literature, and outlines the research efforts that have been made in relation to polymorphic malware analysis and their detection.

Authors and Affiliations

Emmanuel Masabo, Kyanda Swaib Kaawaase

Keywords

Related Articles

AN QUALITY BASED ENHANCEMENT OF USER DATA PROTECTION VIA FUZZY RULE BASED SYSTEMS IN CLOUD ENVIRONMENT

So far, in cloud computing distinct customer is accessed and consumed enormous amount of services through web, offered by cloud service provider (CSP). However cloud is providing one of the services is, security-as-a-ser...

A FRAMEWORK FOR ASPECT BASED SENTIMENT ANALYSIS USING FUZZY LOGIC

Sentiment Analysis (SA) is the study of people’s opinions, emotions, and appraisals toward products and events. In the past years, it fascinated a great deal of attentions from both industry and academia for a variety of...

PROGRESSIVE DATA ANALYTICS IN HEALTH INFORMATICS USING AMAZON ELASTIC MAPREDUCE (EMR)

Identifying, diagnosing and treatment of cancer involves a thorough investigation that involves data collection called big data from multi and different sources that are helpful for making effective and quick decision ma...

ENHANCED NEIGHBORHOOD NORMALIZED POINTWISE MUTUAL INFORMATION ALGORITHM FOR CONSTRAINT AWARE DATA CLUSTERING

Clustering of similar data items is an important technique in mining useful patterns. To enhance the performance of Clustering, training or learning is an important task. A constraint learning semi-supervised methodology...

OPTIMIZED PARTICLE SWARM OPTIMIZATION BASED DEADLINE CONSTRAINED TASK SCHEDULING IN HYBRID CLOUD

Cloud Computing is a dominant way of sharing of computing resources that can be configured and provisioned easily. Task scheduling in Hybrid cloud is a challenge as it suffers from producing the best QoS (Quality of Serv...

Download PDF file
  • EP ID EP532642
  • DOI 10.21917/ijsc.2018.0246
  • Views 65
  • Downloads 0

How To Cite

Emmanuel Masabo, Kyanda Swaib Kaawaase (2018). A STATE OF THE ART SURVEY ON POLYMORPHIC MALWARE ANALYSIS AND DETECTION TECHNIQUES. ICTACT Journal on Soft Computing, 8(4), 1762-1774. https://www.europub.co.uk/articles/-A-532642