Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 6
Abstract
Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats that can be used in implementing security prevention mechanisms. In order to learn and understand the malwares, behavior-based technique that applied dynamic approach is the possible solution for identification, classification and clustering the malwares.[1] However, it is still unpopular because of its rigid and restrictive nature. In this paper, we study and analyze both approaches and try to determine the best and optimal anti-malware approach.Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats that can be used in implementing security prevention mechanisms. In order to learn and understand the malwares, behavior-based technique that applied dynamic approach is the possible solution for identification, classification and clustering the malwares.[1] However, it is still unpopular because of its rigid and restrictive nature. In this paper, we study and analyze both approaches and try to determine the best and optimal anti-malware approach.
Authors and Affiliations
Ashwini Mujumdar , Gayatri Masiwal, , Dr. B. B. Meshram
A New Optimization Method for Dynamic Travelling Salesman Problem with Hybrid Ant Colony Optimization Algorithm and Particle Swarm Optimization
In recent decades, with the introduction of optimization problems, new methods of was optimizing developed. The most important group of optimization techniques is meta-heuristic method. That is able to solve the...
DOCUMENT FAXING THROUGH MOBICLOUD USING ANDROID
This paper discusses about the software which is developed for the Android mobile devices for widely used in the Business fields as well as our day to day life activities. In this era of paperless offices and digit...
Design of High Speed Binary to Gray Code Converter Using A Novel Two Transistor XOR Gate
t—In modern era, Ultra low power design has an Active research topic due to its various Applications. In this paper we introduce a novel low power and Area efficient Binary to Gray code converter is implemented...
Enhancement of the Security of a Digital Image using the Moduli Set
Digital images have found usage in many applications. These images may contain confidential information and need to be protected when stored on memory or transmitted over networks. Many techniques have been proposed...
Speech based Emotion Recognition with Gaussian Mixture Model
This paper is mainly concerned with speech based emotion recognition. The main work is concerned with Gaussian mixture model (GMM model) which allows training the desired data set from the databases. GMM are known...