Detection And Analysis Of Malware
Keywords:
Worm, Malware, Trojan horsesAbstract
The paper will begin with an introduction describing the various types of malware. Types of malware described include Virus, Worms, Trojans, Adware, Spyware, Backdoors and Rootkits that can disastrously affect a Microsoft Windows operating system. A brief description of the steps of an incident response plan will be described. The role of malware analysis and what steps it pertains to in an incident response plan will be described. The next section will discuss the goals to be accomplished by performing malware Analysis. After discussing malware acquisition for malware analysis, a methodology is presented for performing malware analysis.
References
REFERENCES
Computer Economics, 2007 Malware Report: The Economic Impact of
Viruses, Spyware, Adware, Botnets and Other Malicious Code, Retrieved
, November 23 from http://www.computereconomics.com/
article.cfm?id=1225
EldadEilam, (2005). Reversing: Secrets of Reverse Engineering.
Indianapolis, IN: Wiley Publishing. eWeek, Metasploit Creator Releases
Malware Search Engine, retrieved 2007, November 24 from
http://www.eweek.com/article2/0,1759,1990158,00.asp
GIAC, Analysis of the Incident Handling Six Step Process, Retrieved 2007,
November 24 from http://www2.giac.org/resources/whitepaper/
network/17.php?id=17&cat=network
Honeynet, Know Your Enemy: Malicious Web Servers, Retrieved 2007,
November 24 from http://www.honeynet.org/papers/mws/KYE
Malicious_Web_Servers.htm
Lorna Hutcheson (2006), Malware Analysis The Basics, Retrieved 2007,
November 24 from http://isc.sans.org/presentations/cookie.pdf
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Trinity Journal of Management, IT & Media (TJMITM)
This work is licensed under a Creative Commons Attribution 4.0 International License.