Nobody downloaded yet

Investigating Dynamic Malware Analysis tool - Research Proposal Example

Comments (0) Cite this document
Summary
Malware has evolved into a more lethal threat by use of multiple vectors to launch attacks and exploit both unknown and known computer vulnerabilities and can infest prescanned files and folders with lightning speed. It will be expedient to equip scanners for the detection of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Investigating Dynamic Malware Analysis tool
Read TextPreview

Extract of sample "Investigating Dynamic Malware Analysis tool"

Download file to see previous pages Signature based detection is susceptible to invasion. Since the pattern or the signature is obtained from a familiar malware, this detection technique is easily evaded by obfuscating a program such as junk insertion and packing (Mishra, 2010). Even simple obfuscation such as code re-ordering and inserting no-ops can create a variant of malware able to evade signature-based detectors.
This technique is also not able to detect unknown malware. The signatures of this program are architecture by close observation of known malware hence signature-based detection is only able to detect “known malware.” At times, signature-based detection fails to pick a variant of an already known malware. In this respect, signature-based detection offers minimal zero-day protection (Venugopal & Hu, 2008). In addition, the signature database grows exponentially since the detector uses a specific signature for every variant of malware.
Heuristic scanning bears a close resemblance to signature scanning with the only difference being, instead of checking for particular signatures; heuristic scanning will check for certain commands or instructions within a program, which are not typically found in application programs (Aycock, 2006). The heuristic engine ultimately is better placed to sense for potentially malicious executions in previously unexamined and new malicious behavior such as virus replication mechanism, payload of Trojan or worm distribution routine.
Generic virus protection renders all other malware scanners obsolete and offers sufficient protection to stop any malware. The user is saved from weekly software updates since the software is able to detect all malwares.
Although heuristic malware check offers tremendous benefits, today this technology is not adequate. Virus writers are able to come up with viruses that disregard the ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Investigating Dynamic Malware Analysis tool Research Proposal”, n.d.)
Investigating Dynamic Malware Analysis tool Research Proposal. Retrieved from https://studentshare.org/information-technology/1656875-investigating-dynamic-malware-analysis-tool
(Investigating Dynamic Malware Analysis Tool Research Proposal)
Investigating Dynamic Malware Analysis Tool Research Proposal. https://studentshare.org/information-technology/1656875-investigating-dynamic-malware-analysis-tool.
“Investigating Dynamic Malware Analysis Tool Research Proposal”, n.d. https://studentshare.org/information-technology/1656875-investigating-dynamic-malware-analysis-tool.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Investigating Dynamic Malware Analysis tool

Profit Implications of Malware

...that malware creators are increasing adopting complex techniques to prevent their virus code from being detected by signature matching anti-virus scanners. The techniques they use include polymorphic encryption where the virus is encrypted to avoid detection (Micahel A. Davis). Secondly they use metamorphic obfuscation where the virus code is morphed by adding non-virus logic to hide the presence of virus logic therefore making the virus signature change as the code changes thereby rendering the virus undetectable by matching the signature of the pre-morphed virus. Also code integration has been adopted whereby the virus code is mixed into the valid program code by using available tools such as Mistfall...
15 Pages(3750 words)Annotated Bibliography

Dynamic Programming: Path Analysis

...coordinate programs that fall under them. From the current position of the company, the company want to get to a destination of 60% growth in five (5) years. The report therefore presents a technique under the basis of dynamic programming to bring out the path to trend to come to a successful destination under the different variables and programs. Musama (2003) explains that path analysis program always leads to a conclusive shortcut and financial prudence in selecting a line of strategy to tow. In the conclusion, it was established that the most useful path to two is system networking – to – on campus hiring – to – branch expansion – to – company merger – to – social networking. Introduction The global...
3 Pages(750 words)Essay

Dynamic Analysis of Malware

...? Dynamic Analysis of Malware Dynamic Analysis of Malware Malware is a generic term referring to kinds of unwanted softwares. Dynamic malware analysis came about due to problems arising in reference to manual malware analysis. Dynamic malware analysis comprises of methods that analyze large amounts of malware in a fast and reliable fashion. The main focus of researchers is on different types of dynamic malware analysis...
4 Pages(1000 words)Research Paper

Survey about CWsandbox tool which used for dynamic malware analysis

...as an isolated system. References Hoopes, J. (2009). Virtualization for security: Including sandboxing, disaster recovery, high availability, forensic analysis, and honeypotting. Burlington, MA: Syngress Pub. Fu, X. (2012). Dr. Fu’s Security Blog. Retrieved from http://fumalwareanalysis.blogspot.com/2012/10/malware-analysis-tutorial-34-evaluation.html Litux. (2011). Analyzing Malware with CWSandbox. Retrieved from http://books.gigatux.nl/mirror/honeypot/final/ch12lev1sec3.html GFI. (2012). Dynamic Malware Analysis. GFI. Retrieved from...
4 Pages(1000 words)Research Paper

Power Tool Market Analysis

...is not material. The projected values represent a decline of approximately 11.5% over the last year's figure of 1.8 million units by U.S. Census Bureau. The values for the last 5 years show a continuous declining trend. The following table summarizes the historic actual values. Year Housing Starts (million) 2006 (November) 1.801 2005 2.068 2004 1.955 2003 1.847 2002 1.704 2001 1.602 From the above statistics, it can be concluded that the demand for power tools in this sector may not increase in 2007 as the economic activity is declining. The demand may infact decrease since lesser number of houses will be developed. 2. Expenditure for Residential Construction The expenditure for residential construction is expected to...
2 Pages(500 words)Essay

Forensics Based On Evidence Gathered With Peep Attacks

...to clarify the complex investigation effort following a Peep attack. We describe evidence collection and problem-solving techniques in the application of computer forensic analyses. A Peep attack is one of the most notorious hacking tools, based on the Robot Network (Botnet) Structure. A Botnet is a term for a collection of zombie systems and autonomous software robots. The threat from Botnets is growing at an alarming rate and the attack techniques are becoming increasingly sophisticated. The majority of the literature describing Botnet attacks is focused on a varied level of IRC-based malware, the activity of Spam mail and the structure of Distributed Denial of Service (DDOS). However,...
15 Pages(3750 words)Essay

Business: Information Technology Malware

...Business: Information Technology Malware One of the prominent technological concerns that small businesses must become cognizant of is malware infecting Internet systems. When examining this issue one of the overarching concerns is the intention of the technicians involved in the creation of the malware. In these regards, it’s noted that in large part these individuals are motivated not out financial concern, but out of a desire to embarrass the entities they are targeting (Vance 2011). Indeed, one group, Anonymous, have even implemented malware in an organized and concerted effort to attempt to enact political change (Landers 2008). There are a variety of concerns related to the future of malware. One of the overarching concerns... is the...
1 Pages(250 words)Research Paper

Server malware protection policy

...Server malware protection policy Malware such as virus, Trojans and worms bring out a serious threat to data processing systems today. Many companies have had their data corrupted, and some have even lost their confidential information. It is thus significant for a company to develop a server malware protection policy to help tackle the various malware that lead to the loss of data. The thesis of this paper is to look at ways of dealing with the various forms of malware that corrupt data. Introduction Malware refers to a malicious software that is designed to infiltrate, do wrong or unwanted actions to a computer system without the...
4 Pages(1000 words)Assignment

Investigating Dynamic Malware Analysis tool

...Investigating Dynamic Malware Analysis tool Malware is a type of malicious software, which has been major software through which intruders steal crucial information out of organizations. The continuous evolutionary patterns of the malware designs have raise difficult for the analysts in terms of identifying and terminating such programs from slipping into systems in an undetected manner. Considering these matters, there are certain possible ways through which such malicious programs can be terminated. One of such attained findings includes the sandbox technology that has proved to be appropriate enough in terms of identifying and testing such codes. It has been identified that the sandbox tools are effective in terms of updating... patterns,...
20 Pages(5000 words)Research Paper

Symptom Analysis Tool In Psycholody

...Symptom Analysis Tool Symptom: A-Identify (list) appropriate history questions to be asked of your client to discriminate critical characteristics or attributes about the above presenting complaint. B- Delineate competing hy­potheses that could support the above symptoms in rela­tion to pertinent answers given in the history. Note: you should include the diagnosis from the Final Assessment Findings section in the case study as part of the hypothesis. (you do not need to completed 5, only the 3 I listed) 1. Cholecystitis 2. Peptic ulcer perforation 3. Gastroenteritis C- Explain the physical findings or reported symptoms you would expect during the visit. Using the inspection, palpation,...
2 Pages(500 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Proposal on topic Investigating Dynamic Malware Analysis tool for FREE!

Contact Us