UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 4
April-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1904V41


Registration ID:
501133

Page Number

646-652

Share This Article


Jetir RMS

Title

Study of Malware and Malware Detection Techniques

Abstract

All over the world, thousands of people created malware. Because of this we are experiencing an ever growing security problem with malicious code and consequently seeing the malware analysis research as a new scientific field. Malware has been used by cybercriminals as weapons in compromising security of system. Everyday new variants of malware are created by malware authors to evade detection by anti-malware engines. It became a serious threat for the information security from the past decade. Despite so many corrective measures, the threat is increasing in an unprecedented rate which is a motivation for the researchers to work on it. Today’s it is clear that how difficult for anti-malware companies to tackle attacks and also releases there new updates within a limited time to prevent their customers from malware infection. It must we clear Malware protection is a very important task of anti-malware companies as we know a huge data and money can be lost just because of one single attack. In this paper, researchers first provide a brief overview on malware and needs on malware detection. This study presents a systematic and detailed survey of the malware detection mechanisms using data mining techniques. In this study, besides presenting the full and comprehensive literature on malware definitions, types, various detection techniques and methods, our objective is to give an idea about various techniques that are used for representing the malware samples. The objective of the study is to provide a reference, which could be suitable for further studies to develop malware detection system.

Key Words

Malware, Virus , Machine Learning

Cite This Article

"Study of Malware and Malware Detection Techniques", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 4, page no.646-652, April-2019, Available :http://www.jetir.org/papers/JETIR1904V41.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Study of Malware and Malware Detection Techniques", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 4, page no. pp646-652, April-2019, Available at : http://www.jetir.org/papers/JETIR1904V41.pdf

Publication Details

Published Paper ID: JETIR1904V41
Registration ID: 501133
Published In: Volume 6 | Issue 4 | Year April-2019
DOI (Digital Object Identifier):
Page No: 646-652
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00046

Print This Page

Current Call For Paper

Jetir RMS