Detection And Analysis Of Malware

Authors

  • Natasha Maniktahla Asst. Professor ; Department of BCA ; Trinity Inst. of Professional Studies, Dwarka
  • Preeti Goel Asst. Professor ; Department of BCA ; Trinity Inst. of Professional Studies, Dwarka

Keywords:

Worm, Malware, Trojan horses

Abstract

The paper will begin with an introduction describing the various types of  malware. Types of malware described include Virus, Worms, Trojans,  Adware, Spyware, Backdoors and Rootkits that can disastrously affect a  Microsoft Windows operating system.  A brief description of the steps of an incident response plan will be  described. The role of malware analysis and what steps it pertains to in  an incident response plan will be described. The next section will discuss  the goals to be accomplished by performing malware Analysis. After  discussing malware acquisition for malware analysis, a methodology is  presented for performing malware analysis.

References

REFERENCES

Computer Economics, 2007 Malware Report: The Economic Impact of

Viruses, Spyware, Adware, Botnets and Other Malicious Code, Retrieved

, November 23 from http://www.computereconomics.com/

article.cfm?id=1225

EldadEilam, (2005). Reversing: Secrets of Reverse Engineering.

Indianapolis, IN: Wiley Publishing. eWeek, Metasploit Creator Releases

Malware Search Engine, retrieved 2007, November 24 from

http://www.eweek.com/article2/0,1759,1990158,00.asp

GIAC, Analysis of the Incident Handling Six Step Process, Retrieved 2007,

November 24 from http://www2.giac.org/resources/whitepaper/

network/17.php?id=17&cat=network

Honeynet, Know Your Enemy: Malicious Web Servers, Retrieved 2007,

November 24 from http://www.honeynet.org/papers/mws/KYE

Malicious_Web_Servers.htm

Lorna Hutcheson (2006), Malware Analysis The Basics, Retrieved 2007,

November 24 from http://isc.sans.org/presentations/cookie.pdf

Published

2014-12-25

How to Cite

Detection And Analysis Of Malware. (2014). Trinity Journal of Management, IT & Media (TJMITM), 5(1), 68–70. Retrieved from https://acspublisher.com/journals/index.php/tjmitm/article/view/1313