Affiliation:
1. Hacettepe University, Turkey
Abstract
With the development and spread of information technologies in recent years, malware has started to manifest itself as a widespread threat that can affect large networks rather than being confined to small attacks. 1 2 3 4 5 As long as the Internet and its connected devices are used, there is the possibility of encountering malicious software every day. And while end-user awareness is increasing in the fight against malware, it is not sufficient to stop malware production and attackers who use malicious software because of vulnerabilities found in systems, errors in the software used and connected networks, and subsequent security vulnerabilities. 6, 7 Malware is a widespread threat and it increases in volume every day. It's essential to understand how it works and how it is evolving. Examining malware and determining how it functions and what its capabilities are is a complex task, made harder by the attackers’ use of anti-forensic features. Dr Ilker Kara of Hacettepe University, Turkey, offers an overview of malware types and forms of attack, and proposes a novel approach to malware analysis, explaining how it works through an example using a real malware attack.
Subject
Law,General Computer Science
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献