Malware Analysis and Mitigation in Information Preservation

Abstract

Malware, also known as malicious software affects the user’s computer system or mobile devices by exploiting the system’s vulnerabilities. It is the major threat to the security of information in the computer systems. Some of the types of malware that are most commonly used are viruses, worms, Trojans, etc. Nowadays, there is a widespread use of malware which allows malware author to get sensitive information like bank details, contact information, which is a serious threat in the world. Most of the malwares are spread through internet because of its frequent use which can destroy large information in any system. Malwares from their early designs which were just for propagation have now developed into more advanced form, stealing sensitive and private information. Hence, this work focuses on analyzing the malware in a restricted environment and how information can be preserved. So, in other to address the negative effects of malicious software, we discussed some of the malware analysis methods which was used to analyze the software in an effective manner and helped us to controlthem. Various malware detection coupled with malware propagation techniques were also highlighted. This work was concluded by examining malware mitigation strategies which can help us protect our system’s information.

Authors and Affiliations

AruOkereke Eze, ChiaghanaChukwunonso E.

Keywords

Related Articles

Real Time Monitoring of Transient Stability Status ofIntegrated Hybrid Distributed Generation: A Comparison ofANN Approaches

The analytical approach in transient stability assessment is inadequate to handle real time operation of power system due to the unavailability of accurate mathematical equations for most dynamic systems, and given the l...

Simulation and Modeling of Hybrid Electrical Energy with Combination of Microgrid

Distributed energy resource (DER) distributed storage and loads are the three combining together in microgrid. There is so many requirement of electrical energy the need can be fulfilled by renewable energy source additi...

Comparitive Analysis of Fuzzy Based MPPT for Boost and SEPIC Converter Topologies for PV Application

This paper proposes the Maximum Power Point Tracking based on Fuzzy logic control for PV System.MPPT is required to extract maximum power corresponding to specific operating point. The output power of PV System is depend...

Ant Lion Optimization for Dynamic Economic Dispatch

In this paper, Ant Lion Optimization (ALO) is presented to solve the dynamic economic dispatch (DED) problem considering valve-point effects, the ramp rate limits and transmission losses. The practical DED problems have...

Adaptive Pi Control of Statcom for Voltage Regulation

Static compensator (STATCOM) can provide fast and efficient reactive power support to maintain power system voltage stability. In the literature, various STATCOM control methods have been discussed including many applica...

Download PDF file
  • EP ID EP388913
  • DOI 10.9790/1676-1304022736.
  • Views 139
  • Downloads 0

How To Cite

AruOkereke Eze, ChiaghanaChukwunonso E. (2018). Malware Analysis and Mitigation in Information Preservation. IOSR Journals (IOSR Journal of Electrical and Electronics Engineering), 13(4), 27-36. https://europub.co.uk/articles/-A-388913