{"title":"Malware Variants Detection Methods","authors":"Rinu Rani Jose, A. Salim","doi":"10.1109/ICCI46240.2019.9404383","DOIUrl":null,"url":null,"abstract":"Malware industry is growing exponentially and the Internet is used as an entry point by most of the malwares. Thus the Internet security have been severely affected by the drastic growth of malwares. Malware detection is critical for protection against data theft, security breaches and other dangers. But the detection techniques continues to be challenging, as the attackers invent new techniques in order to resist the detection methods. It is reported that over 98% of the new malwares are exactly the derivatives of already existing malware families. Thus efficient techniques are required for the identification of malware variants or samples. This paper aims to overview various techniques developed so far for malware detection. Each of the examined techniques relies on either static, or dynamic or a combined approach.","PeriodicalId":178834,"journal":{"name":"2019 IEEE International Conference on Innovations in Communication, Computing and Instrumentation (ICCI)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Innovations in Communication, Computing and Instrumentation (ICCI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCI46240.2019.9404383","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Malware industry is growing exponentially and the Internet is used as an entry point by most of the malwares. Thus the Internet security have been severely affected by the drastic growth of malwares. Malware detection is critical for protection against data theft, security breaches and other dangers. But the detection techniques continues to be challenging, as the attackers invent new techniques in order to resist the detection methods. It is reported that over 98% of the new malwares are exactly the derivatives of already existing malware families. Thus efficient techniques are required for the identification of malware variants or samples. This paper aims to overview various techniques developed so far for malware detection. Each of the examined techniques relies on either static, or dynamic or a combined approach.