Abstract
Malware is an international issue which results in the loss of integrity, security, and authenticity. Some malwares work autonomously whereas some malware use a host and some malware change their identity each time. Researchers are constantly working for the defense mechanism. This paper focuses to analyze malware architecture to give a detailed study of malware which can be helpful to design a strong defense mechanism. Although many authors analyzed and classified the malwares in several categories, this paper classifies malware into four categories as per their architecture at the time of infection and discusses the mechanism behind the malware architectures. This paper also observed the performance of network at the time of infection.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Kramer, S., Bradfield, J.C.: A general definition of malware. J. Comput. Virol. 6, 105–114 (2010). https://doi.org/10.1007/s11416-009-0137-1
Cisco 2017 Midyear Cybersecurity Report, https://www.automation.com/pdf_articles/cisco/Cisco_2017_MCR_Embargoed_til_072017_5_AM_PT_8_AM_ET.pdf
Cohen, F.: Computer Viruses Theory and Experiments. Elsevier Science Publishers B.V., North Holand (1987)
Ramilli, M., Bishop M.: Multi-Stage Delivery of Malware, pp 91–99, IEEE (2010)
Yoo, I.S., Ultes-Nitsche, U.: Non-signature based virus detection-Towards establishing a unknown virus detection technique using SOM. J. Comput. Virol. 2, 163–186 (2006). https://doi.org/10.1007/s11416-006-0013-1
Hardikar M.A.: MALWARE 101—VIRUSES. SANS Institute InfoSec Reading Room (2008) https://www.sans.org/reading-room/whitepapers/incident/malware-101-viruses-32848
Szor, P.: The Art of Computer Virus Research and Defense. Addison Wesley, Boston (2005)
Wilensky, U.: NetLogo. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL (1999) http://ccl.northwestern.edu/netlogo/
Stonedahl, F., Wilensky, U.: NetLogo Virus on a Network model. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL (2008) http://ccl.northwestern.edu/netlogo/models/VirusonaNetwork
Martcheva M.: Introduction to Epidemic Modeling. An Introduction to Mathematical Epidemiology, ISBN: 978-1-4899-7611-6 (2015)
Sneha, S., Malathi, L., Saranya, R.: A survey on malware propagation analysis and prevention model. Int. J. Adv. Technol. (2015). https://doi.org/10.4172/0976-4860.1000148
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kapat, S.K., Tripathy, S.N. (2019). Malware Architectural View with Performance Analysis in Network at Its Activation State. In: Mallick, P., Balas, V., Bhoi, A., Zobaa, A. (eds) Cognitive Informatics and Soft Computing. Advances in Intelligent Systems and Computing, vol 768. Springer, Singapore. https://doi.org/10.1007/978-981-13-0617-4_20
Download citation
DOI: https://doi.org/10.1007/978-981-13-0617-4_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0616-7
Online ISBN: 978-981-13-0617-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)