Y. Supriya, G. Kumar, Dammu Sowjanya, D. Yadav, Devarakonda Lakshmi Kameshwari
{"title":"恶意软件检测技术综述","authors":"Y. Supriya, G. Kumar, Dammu Sowjanya, D. Yadav, Devarakonda Lakshmi Kameshwari","doi":"10.1109/PDGC50313.2020.9315764","DOIUrl":null,"url":null,"abstract":"Malware is derived from malicious software which mitigate to attacks on the computer systems and collecting private data. The survey is available in huge evidences to suggest its impact in global losses. Malware detectors are basic tools to protect from the same malware attacks. Therefore, it is important to require study on malware detection techniques, to avoid and identify the type of malware attacked on systems. In this manuscript, a survey report is available to defend against malware attacks and analysis techniques. There are many malware detection techniques, such as signature and anomaly detection techniques with an idea of comparison and decision making about its strengths. This provides as a user reference to the end user for likely detailed information.","PeriodicalId":347216,"journal":{"name":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Malware Detection Techniques: A Survey\",\"authors\":\"Y. Supriya, G. Kumar, Dammu Sowjanya, D. Yadav, Devarakonda Lakshmi Kameshwari\",\"doi\":\"10.1109/PDGC50313.2020.9315764\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Malware is derived from malicious software which mitigate to attacks on the computer systems and collecting private data. The survey is available in huge evidences to suggest its impact in global losses. Malware detectors are basic tools to protect from the same malware attacks. Therefore, it is important to require study on malware detection techniques, to avoid and identify the type of malware attacked on systems. In this manuscript, a survey report is available to defend against malware attacks and analysis techniques. There are many malware detection techniques, such as signature and anomaly detection techniques with an idea of comparison and decision making about its strengths. This provides as a user reference to the end user for likely detailed information.\",\"PeriodicalId\":347216,\"journal\":{\"name\":\"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/PDGC50313.2020.9315764\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PDGC50313.2020.9315764","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Malware is derived from malicious software which mitigate to attacks on the computer systems and collecting private data. The survey is available in huge evidences to suggest its impact in global losses. Malware detectors are basic tools to protect from the same malware attacks. Therefore, it is important to require study on malware detection techniques, to avoid and identify the type of malware attacked on systems. In this manuscript, a survey report is available to defend against malware attacks and analysis techniques. There are many malware detection techniques, such as signature and anomaly detection techniques with an idea of comparison and decision making about its strengths. This provides as a user reference to the end user for likely detailed information.