Malware Analysis and Mitigation in Information Preservation

Abstract

Malware, also known as malicious software affects the user’s computer system or mobile devices by exploiting the system’s vulnerabilities. It is the major threat to the security of information in the computer systems. Some of the types of malware that are most commonly used are viruses, worms, Trojans, etc. Nowadays, there is a widespread use of malware which allows malware author to get sensitive information like bank details, contact information, which is a serious threat in the world. Most of the malwares are spread through internet because of its frequent use which can destroy large information in any system. Malwares from their early designs which were just for propagation have now developed into more advanced form, stealing sensitive and private information. Hence, this work focuses on analyzing the malware in a restricted environment and how information can be preserved. So, in other to address the negative effects of malicious software, we discussed some of the malware analysis methods which was used to analyze the software in an effective manner and helped us to controlthem. Various malware detection coupled with malware propagation techniques were also highlighted. This work was concluded by examining malware mitigation strategies which can help us protect our system’s information.

Authors and Affiliations

AruOkereke Eze, ChiaghanaChukwunonso E.

Keywords

Related Articles

Modified Six-Degree of Freedom related to Takeoff and Landing stages of Aircraft

Six degrees of freedom (6DoF) means to the freedom of movement of a rigid body (like aircraft) in three-dimensional space. Specifically, the body is free to change position as forward/backward, up/down, left/right transl...

Voltage Stability Assurance Based Optimal Location and Sizing of Distribution Generation in Radial Distribution System

In general during light loading conditions, the feeder voltage may raise significantly and vice versa for heavy loading conditions. In addition, the increasing trend of different Distribution Generation (DG) is focusing...

Design of 10-bit current steering DAC with binary and segmented architecture

This paper presents the design of 10-bit current steering DAC of binary and segmented architectures with 400MHz clock frequency. This circuit is designed in 130nm technology; with a supply voltage of 3.3V.This design is...

Real Time Monitoring of Transient Stability Status ofIntegrated Hybrid Distributed Generation: A Comparison ofANN Approaches

The analytical approach in transient stability assessment is inadequate to handle real time operation of power system due to the unavailability of accurate mathematical equations for most dynamic systems, and given the l...

The Determination of Effects of Primary and Secondary Geometry of Tubular Linear Generator

In this paper, general information on the construction of tubular generators are given. Also, the numeric analyses were conducted by using 2D and 3D finite elements software. The output power, iron loss and cogging force...

Download PDF file
  • EP ID EP388913
  • DOI 10.9790/1676-1304022736.
  • Views 126
  • Downloads 0

How To Cite

AruOkereke Eze, ChiaghanaChukwunonso E. (2018). Malware Analysis and Mitigation in Information Preservation. IOSR Journals (IOSR Journal of Electrical and Electronics Engineering), 13(4), 27-36. https://europub.co.uk/articles/-A-388913