Affiliation:
1. Federal University of Pernambuco, Brazil
Abstract
Malware (amalgam between the words malicious and software) aims to access a device without the permission of its owner. Undoubtedly, antiviruses are the most popular mechanism in relation for information security. They are present on 95% of personal computers and are associated with combating malicious applications. Technically, the modus operandi of the COTS antiviruses is for the most part the identification of the executable malicious in their datasets nominated blacklist. The major problem with the strategy, adopted by COTS antiviruses, is that in order to detect a new malware, some machines must have already been infected. In order to demonstrate the inefficiency of COTS antiviruses, the authors evaluate the accuracy of conventional antiviruses. On average, the 86 main worldwide antiviruses were able to detect 54.84%, 34.95%, 42.17%, and 16.82% of Portable Executable (PE), Java, JavaScript, and PHP malwares, respectively. Thus, traditional antiviruses have severe limitations when dealing with cyber-pandemic caused by malware.
Reference40 articles.
1. Enhancing the Detection of Metamorphic Malware Using Call Graphs.;Computers & Security,2014
2. IoTDS: A One-Class Classification Approach to Detect Botnets in Internet of Things Devices
3. CISCO. (2011). The Internet of Things: How the Next Evolution of the Internet Is Changing Everything. Available in: https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
4. CISCO. (2018). CISCO 2018 Annual Cybersecurity Report. Available in: https://www.cisco.com/c/dam/m/hu_hu/campaigns/security-hub/pdf/acr-2018.pdf
5. Cisco. (2014). Cisco 2014 Annual Security Report. Available in: https://www.efocus.sk/images/uploads/Cisco_2014_ASR.pdf
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献