Classification and identification of Malicious codes

Journal Title: Indian Journal of Computer Science and Engineering - Year 2012, Vol 3, Issue 2

Abstract

Malicious codes are serious threat to our society. The presented work discusses various aspects of technological level, detection, mitigation , identification and Classification of malicious codes. Detection method depicts how various antivirus technologies get used to fight with complex encrypting , decrypting and nature changing virus activities. Antivirus approach consists of waiting for a number of computers to be infected, detecting the virus, designing a solution, delivering and deploying a solution.

Authors and Affiliations

Ankur Singh Bist

Keywords

Related Articles

Low Contrast Image Enhancement Using Adaptive Filter and DWT: A Literature Review 

Image enhancement refers to accentuation, or sharpening of image features such as edges, boundaries or contrast to make a graphic display more useful for display and analysis. One of the most common defects of photograph...

PERFORMANCE ANALYSIS OF MCCDMA SYSTEM IN RAYLEIGH CHANNEL USING QPSK MODULATION

In this paper, the error performance of an MC-CDMA system is analysed with the help of Quadrature Phase shift Keying (QPSK) as the modulation technique mixed up with Additive White Gaussian Noise (AWGN) in the Rayleigh c...

PERFORMANCE IMPROVEMENT USING FUZZY BASED DYNAMIC BUFFER SCHEME FOR EFFICIENT RRM IN WIMAX 16M NETWORKS

The IEEE 802.16m standard for Advanced mobile broadband wireless access provides a seamless application connectivity to other mobile and IP networks like UMTS, LTE and WLAN. In order to meet the ubiquitous service delive...

BYZANTINE FAULT TOLERANCE MODEL FOR SOAP FAULTS

The proposed model is to configure Byzantine Fault Tolerance mechanism for every SOAP fault message that is transmitted. The reliability and availability are of major requirements of Web services since they operate in th...

IMPACT OF GRID BASED ORMT ON VARIOUS CASE STUDIES

Optimal Resource management Techniques (ORMT) will provide an efficient Grid Resource allocation automatically for a user who is submitting the job without grid knowledge, design a Grid service (portal) for selects the B...

Download PDF file
  • EP ID EP97904
  • DOI -
  • Views 127
  • Downloads 0

How To Cite

Ankur Singh Bist (2012). Classification and identification of Malicious codes. Indian Journal of Computer Science and Engineering, 3(2), 282-287. https://europub.co.uk/articles/-A-97904