Trends in Malware Attacks

Author:

Pandey Abhishek Kumar1,Tripathi Ashutosh Kumar1,Kapil Gayatri1,Singh Virendra1,Khan Mohd. Waris1,Agrawal Alka1,Kumar Rajeev1ORCID,Khan Raees Ahmad1

Affiliation:

1. Babasaheb Bhimrao Ambedkar University, India

Abstract

Security issues are ever-evolving in today's scenario due to the heterogeneous nature of software applications, multimedia features, multilingual interactive and responsible features, and rapid rise in third-party software products. The main objective of this chapter is to focus on the difficulties and components that the users have to contend with on the internet. This chapter investigates and manages ongoing malware attacks. It also explains the significance of the research, malware investigation, social engineering, and user awareness in the field of malware attacks. Cyber-attacks are the most common problem in recent years, and the increasing number of malware is becoming a challenging task for security experts. This chapter underlines key issues along with various aspects for experts to discuss and focus on reducing the threats posed by malware and planning the strategy for prevention in the future. The chapter provides an effective future direction for researchers to produce impactful outcomes.

Publisher

IGI Global

Reference20 articles.

1. betanews. (2018). Banking Trojan Attacks Up By 16 Percent In 2018. Retrieved from https://betanews.com/2019/03/07/banking-trojan-attacks-2018/

2. calyptix. (2017). Biggest Cyber Attacks 2017: How They Happened. Retrieved from https://www.calyptix.com/top-threats/biggest-cyber-attacks-2017-happened/

3. cisecurity. (2019). Top 10 Malware January 2019. Retrieved from https://www.cisecurity.org/blog/top-10-malware-january-2019/

4. digitalguardian. (2019). A History of Ransomware Attacks: The Biggest and Worst Ransomware Attacks of All Time. Retrieved from https://digitalguardian.com/blog/history-ransomware-attacks-biggest-and-worst-ransomware-attacks-all-time

5. Forbes. (2019). Four Phishing Attack Trends To Look Out For In 2019. Retrieved from https://www.forbes.com/sites/forbestechcouncil/2019/01/10/four-phishing-attack-trends-to-look-out-for-in-2019/#17dddc404ec2

Cited by 8 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Intensifying Cross Architecture Cyber-Resilience System with Descriptive Malware Analysis;Lecture Notes in Networks and Systems;2024

2. Lightweight Model for Botnet Attack Detection in Software Defined Network-Orchestrated IoT;Applied Sciences;2023-04-07

3. Security Issues and Mitigation Mechanisms in Distributed Systems;2023 3rd International Conference on Advanced Research in Computing (ICARC);2023-02-23

4. Anomaly Based Network Intrusion Detection Using Ensemble Classifiers;2022 4th International Conference on Sustainable Technologies for Industry 4.0 (STI);2022-12-17

5. Malware Detection in Deep Learning;Convergence of Deep Learning In Cyber‐IoT Systems and Security;2022-11-04

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3