A STATE OF THE ART SURVEY ON POLYMORPHIC MALWARE ANALYSIS AND DETECTION TECHNIQUES
Journal Title: ICTACT Journal on Soft Computing - Year 2018, Vol 8, Issue 4
Abstract
Nowadays, systems are under serious security threats caused by malicious software, commonly known as malware. Such malwares are sophisticatedly created with advanced techniques that make them hard to analyse and detect, thus causing a lot of damages. Polymorphism is one of the advanced techniques by which malware change their identity on each time they attack. This paper presents a detailed systematic and critical review that explores the available literature, and outlines the research efforts that have been made in relation to polymorphic malware analysis and their detection.
Authors and Affiliations
Emmanuel Masabo, Kyanda Swaib Kaawaase
FEATURE BASED COMMUNITY DETECTION BY EXTRACTING FACEBOOK PROFILE DETAILS
FEATURE BASED COMMUNITY DETECTION BY EXTRACTING FACEBOOK PROFILE DETAILS
ENSEMBLE CLASSIFICATION BASED MICROARRAY GENE RETRIEVAL SYSTEM
Data mining plays an important role in the process of classifying between the normal and the cancerous samples by utilizing microarray gene data. As this classification process is related to the human lives, greater sens...
PERFORMANCE COMPARISON AMONG LOCAL AND FOREIGN UNIVERSITIES WEBSITES USING SEO TOOLS
Websites are the main contributors of today’s businesses and assisting the users to surge business throughout the world by the search engine optimization (SEO) techniques are endlessly losing. In order to get greater bus...
PRIVACY PRESERVING DATA MINING USING THRESHOLD BASED FUZZY C-MEANS CLUSTERING
Privacy preserving is critical in the field of where data mining is transformed into cooperative task among individuals. In data mining, clustering algorithms are most skilled and frequently used frameworks. In this pape...
MULTI-DOCUMENT TEXT SUMMARIZATION USING CLUSTERING TECHNIQUES AND LEXICAL CHAINING
This paper investigates the use of clustering and lexical chains to produce coherent summaries of multiple documents in text format to generate an indicative, less redundant summary. The summary is designed as per user’s...