Malware Architectural View with Performance Analysis in Network at Its Activation State

  • Sisira Kumar KapatEmail author
  • Satya Narayan Tripathy
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 768)


Malware is an international issue which results in the loss of integrity, security, and authenticity. Some malwares work autonomously whereas some malware use a host and some malware change their identity each time. Researchers are constantly working for the defense mechanism. This paper focuses to analyze malware architecture to give a detailed study of malware which can be helpful to design a strong defense mechanism. Although many authors analyzed and classified the malwares in several categories, this paper classifies malware into four categories as per their architecture at the time of infection and discusses the mechanism behind the malware architectures. This paper also observed the performance of network at the time of infection.


Malware architecture Independent malware Appending malware Prepending malware Position-independent malware Categories of malware 


  1. 1.
    Kramer, S., Bradfield, J.C.: A general definition of malware. J. Comput. Virol. 6, 105–114 (2010). Scholar
  2. 2.
  3. 3.
  4. 4.
    Cohen, F.: Computer Viruses Theory and Experiments. Elsevier Science Publishers B.V., North Holand (1987)Google Scholar
  5. 5.
    Ramilli, M., Bishop M.: Multi-Stage Delivery of Malware, pp 91–99, IEEE (2010)Google Scholar
  6. 6.
    Yoo, I.S., Ultes-Nitsche, U.: Non-signature based virus detection-Towards establishing a unknown virus detection technique using SOM. J. Comput. Virol. 2, 163–186 (2006). Scholar
  7. 7.
    Hardikar M.A.: MALWARE 101—VIRUSES. SANS Institute InfoSec Reading Room (2008)
  8. 8.
    Szor, P.: The Art of Computer Virus Research and Defense. Addison Wesley, Boston (2005)Google Scholar
  9. 9.
  10. 10.
  11. 11.
    Wilensky, U.: NetLogo. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL (1999)
  12. 12.
    Stonedahl, F., Wilensky, U.: NetLogo Virus on a Network model. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL (2008)
  13. 13.
    Martcheva M.: Introduction to Epidemic Modeling. An Introduction to Mathematical Epidemiology, ISBN: 978-1-4899-7611-6 (2015)Google Scholar
  14. 14.
    Sneha, S., Malathi, L., Saranya, R.: A survey on malware propagation analysis and prevention model. Int. J. Adv. Technol. (2015). Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceBerhampur UniversityBerhampurIndia

Personalised recommendations