Abstract:
Over the last decade, a war has been taking place which involves the computer security community and the black hat hackers. The security community uses every possible rou...Show MoreMetadata
Abstract:
Over the last decade, a war has been taking place which involves the computer security community and the black hat hackers. The security community uses every possible routine and strategies in order to cease and also to remove the damage caused by the malicious programs while at the same time the black hat community advances their techniques that can easily bypass the installed security measures. In this paper, a study has been carried out on different classes of Malware and their propagation techniques. We highlight on different detection vectors for malware along with different tools to analyze them. Some challenging issues which need further research are also presented.
Date of Conference: 16-18 December 2016
Date Added to IEEE Xplore: 08 June 2017
ISBN Information: