Advertisement

Malware Architectural View with Performance Analysis in Network at Its Activation State

  • Sisira Kumar Kapat
  • Satya Narayan Tripathy
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 768)

Abstract

Malware is an international issue which results in the loss of integrity, security, and authenticity. Some malwares work autonomously whereas some malware use a host and some malware change their identity each time. Researchers are constantly working for the defense mechanism. This paper focuses to analyze malware architecture to give a detailed study of malware which can be helpful to design a strong defense mechanism. Although many authors analyzed and classified the malwares in several categories, this paper classifies malware into four categories as per their architecture at the time of infection and discusses the mechanism behind the malware architectures. This paper also observed the performance of network at the time of infection.

Keywords

Malware architecture Independent malware Appending malware Prepending malware Position-independent malware Categories of malware 

References

  1. 1.
    Kramer, S., Bradfield, J.C.: A general definition of malware. J. Comput. Virol. 6, 105–114 (2010).  https://doi.org/10.1007/s11416-009-0137-1CrossRefGoogle Scholar
  2. 2.
  3. 3.
  4. 4.
    Cohen, F.: Computer Viruses Theory and Experiments. Elsevier Science Publishers B.V., North Holand (1987)Google Scholar
  5. 5.
    Ramilli, M., Bishop M.: Multi-Stage Delivery of Malware, pp 91–99, IEEE (2010)Google Scholar
  6. 6.
    Yoo, I.S., Ultes-Nitsche, U.: Non-signature based virus detection-Towards establishing a unknown virus detection technique using SOM. J. Comput. Virol. 2, 163–186 (2006).  https://doi.org/10.1007/s11416-006-0013-1CrossRefGoogle Scholar
  7. 7.
    Hardikar M.A.: MALWARE 101—VIRUSES. SANS Institute InfoSec Reading Room (2008) https://www.sans.org/reading-room/whitepapers/incident/malware-101-viruses-32848
  8. 8.
    Szor, P.: The Art of Computer Virus Research and Defense. Addison Wesley, Boston (2005)Google Scholar
  9. 9.
  10. 10.
  11. 11.
    Wilensky, U.: NetLogo. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL (1999) http://ccl.northwestern.edu/netlogo/
  12. 12.
    Stonedahl, F., Wilensky, U.: NetLogo Virus on a Network model. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL (2008) http://ccl.northwestern.edu/netlogo/models/VirusonaNetwork
  13. 13.
    Martcheva M.: Introduction to Epidemic Modeling. An Introduction to Mathematical Epidemiology, ISBN: 978-1-4899-7611-6 (2015)Google Scholar
  14. 14.
    Sneha, S., Malathi, L., Saranya, R.: A survey on malware propagation analysis and prevention model. Int. J. Adv. Technol. (2015).  https://doi.org/10.4172/0976-4860.1000148CrossRefGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceBerhampur UniversityBerhampurIndia

Personalised recommendations