Friday, June 14, 2019

Investigating Dynamic Malware Analysis tool Research Proposal

Investigating Dynamic Malware Analysis tool - Research Proposal ExampleSignature based markion is susceptible to invasion. Since the mold or the signature is obtained from a familiar malware, this detection technique is easily evaded by obfuscating a program such as junk insertion and packing material (Mishra, 2010). Even simple obfuscation such as code re-ordering and inserting no-ops can create a variant of malware able to evade signature-based detectors.This technique is also non able to detect unknown malware. The signatures of this program are architecture by close observation of known malware hence signature-based detection is only able to detect known malware. At times, signature-based detection fails to pick a variant of an already known malware. In this respect, signature-based detection offers minimal zero-day protection (Venugopal & Hu, 2008). In addition, the signature database grows exponentially since the detector uses a specific signature for every variant of malwa re.Heuristic scanning bears a close resemblance to signature scanning with the only disagreement being, instead of checking for particular signatures heuristic scanning will check for certain commands or instructions within a program, which are not typically lay out in application programs (Aycock, 2006). The heuristic engine ultimately is better placed to sense for potentially malicious executions in previously unexamined and new malicious bearing such as virus replication mechanism, payload of Trojan or worm distribution routine.Generic virus protection renders all other malware scanners antiquated and offers sufficient protection to stop any malware. The user is saved from weekly software updates since the software is able to detect all malwares.Although heuristic malware check offers large benefits, today this technology is not adequate. Virus writers are able to come up with viruses that disregard the

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.