Affiliation:
1. Vellore Institute of Technology, India
Abstract
In day to day life, the internet is becoming an essential part for making use of services like online banking or advertising. On the internet, just as in the real world, there are those who wish to harm others by taking advantage of trustworthy individuals anytime whenever money is exchanged. For accomplishing their goals, people intent with malicious software to harm the internet and this attack is named as Malware. The malware denotes as malevolent software which is installed in computer or mobile without awareness of owner or user. As a result, by looking into this malicious software, the IT team is better able to assess a security incident and help stop more infections from spreading to the victim's computer or server. For this kind of performance, IT responders typically look for solutions known technically as malware forensics. The importance of malware forensics has grown as the cybercrime community targets financial institutions, technological companies, and retail businesses with malicious software. This virus can be broken down into two categories: static malware and dynamic malware. While dynamic malware analysis offers various tools and code, static malware analysis has several limitations. As a result, dynamic malware analysis is often preferred in most contexts. This chapter deals with the study of malware types, how it is affecting the users, static malware limitations, and dynamic malware tools that are used for analyzing malicious software. Further focuses on issues, challenges that are facing in malware analysis and available online malware analysis tools that work on cloud along with feature research prospects.
Reference17 articles.
1. Adelstein, F., Stillerman, M., & Kozen, D. (2002). Malicious code detection for open firmware. 18th Annual Computer Security Applications Conference Proceedings. IEEE.
2. Advanced polymorphic techniques;P.Beaucamps;International Journal of Computational Science,2007
3. Bergeron, J. (2001). Static detection of malicious code in executable programs. Int. J. of Req. Eng, 79.
4. Static Analysis of Executables to Detect Malicious Patterns
5. Elhadi, A., Maarof, M., & Osman, A. (2012). Malware detection based on hybrid signature behaviour application programming interface call graph. American Journal of Applied Sciences 9(3), 283.