Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 6
Abstract
Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats that can be used in implementing security prevention mechanisms. In order to learn and understand the malwares, behavior-based technique that applied dynamic approach is the possible solution for identification, classification and clustering the malwares.[1] However, it is still unpopular because of its rigid and restrictive nature. In this paper, we study and analyze both approaches and try to determine the best and optimal anti-malware approach.Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats that can be used in implementing security prevention mechanisms. In order to learn and understand the malwares, behavior-based technique that applied dynamic approach is the possible solution for identification, classification and clustering the malwares.[1] However, it is still unpopular because of its rigid and restrictive nature. In this paper, we study and analyze both approaches and try to determine the best and optimal anti-malware approach.
Authors and Affiliations
Ashwini Mujumdar , Gayatri Masiwal, , Dr. B. B. Meshram
RLC Low Pass Filters Transmission Transient Performance Characteristics Analysis
Filter is considered as a part of an optical system that has the purpose of modifying the intensity, polarization or, in particular, the spectral distribution of light. For reconfigurable filters a signal is applied to t...
Interference Mitigation by CDMA RAKE Receiver With Walsh-Hadamard Sequence
Interference Mitigation by CDMA RAKE Receiver With Walsh-Hadamard Sequence Interference Mitigation by CDMA RAKE Receiver With Walsh-Hadamard Sequence Interference Mitigation by CDMA RAKE Receiver With Walsh-...
Simulated Annealing optimized PID Controller design using ISE, IAE, IATE and MSE error criteria
A PID controller is designed using ISE, IAE, ITAE and MSE error criteria for stable linear time invariant continuous system. A Simulated Annealing PID controller is designed for the plant to meet the desired performance...
Page Interest Estimation using Apriori Algorithm
The paper discusses about web usage mining involves the automatic discovery of user access patterns from one or more Web servers. The paper also confers about the procedure in which the web usage mining of the data se...
DISTRIBUTED GENERATION- A NEW APPROACH
— Indian power sector and power distribution utilities are going through a reformation process to cope up with the regulatory change for reduction in AT & C Loss, improvement in Power Quality, Reliability of Po...