Taxonomy of malware detection techniques

A systematic literature review

Hanif Mohaddes Deylami, Ravie Chandren Muniyandi, Iman Tabatabaei Ardekani, Abdolhossein Sarrafzadeh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends on the technology used. Therefore, it is paramount that the advantages and disadvantages of each type of technology are scrutinized analytically. This study's aim is to scrutinize existing publications on this subject and to follow the trend that has taken place in the advancement and development with reference to the amount of information and sources of such literature. Many of the malware programs are huge and complicated and it is not easy to comprehend the details. Dissemination of malware information among users of the Internet and also training them to correctly use anti-malware products are crucial to protecting users from the malware onslaught. This paper will provide an exhaustive bibliography of methods to assist in combating malware.

Original languageEnglish
Title of host publication2016 14th Annual Conference on Privacy, Security and Trust, PST 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages629-636
Number of pages8
ISBN (Electronic)9781509043798
DOIs
Publication statusPublished - 2016
Event14th Annual Conference on Privacy, Security and Trust, PST 2016 - Auckland, New Zealand
Duration: 12 Dec 201614 Dec 2016

Other

Other14th Annual Conference on Privacy, Security and Trust, PST 2016
CountryNew Zealand
CityAuckland
Period12/12/1614/12/16

Fingerprint

Taxonomies
taxonomy
bibliography
Disease
Internet
industry
trend
Detectors
literature
Malware
Bibliographies
software

Keywords

  • Anomaly-based
  • Malicious code
  • Malware
  • Signature-based
  • System requirements
  • Taxonomy

ASJC Scopus subject areas

  • Safety Research
  • Computer Networks and Communications
  • Hardware and Architecture
  • Safety, Risk, Reliability and Quality

Cite this

Deylami, H. M., Muniyandi, R. C., Ardekani, I. T., & Sarrafzadeh, A. (2016). Taxonomy of malware detection techniques: A systematic literature review. In 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016 (pp. 629-636). [7906998] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/PST.2016.7906998

Taxonomy of malware detection techniques : A systematic literature review. / Deylami, Hanif Mohaddes; Muniyandi, Ravie Chandren; Ardekani, Iman Tabatabaei; Sarrafzadeh, Abdolhossein.

2016 14th Annual Conference on Privacy, Security and Trust, PST 2016. Institute of Electrical and Electronics Engineers Inc., 2016. p. 629-636 7906998.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Deylami, HM, Muniyandi, RC, Ardekani, IT & Sarrafzadeh, A 2016, Taxonomy of malware detection techniques: A systematic literature review. in 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016., 7906998, Institute of Electrical and Electronics Engineers Inc., pp. 629-636, 14th Annual Conference on Privacy, Security and Trust, PST 2016, Auckland, New Zealand, 12/12/16. https://doi.org/10.1109/PST.2016.7906998
Deylami HM, Muniyandi RC, Ardekani IT, Sarrafzadeh A. Taxonomy of malware detection techniques: A systematic literature review. In 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016. Institute of Electrical and Electronics Engineers Inc. 2016. p. 629-636. 7906998 https://doi.org/10.1109/PST.2016.7906998
Deylami, Hanif Mohaddes ; Muniyandi, Ravie Chandren ; Ardekani, Iman Tabatabaei ; Sarrafzadeh, Abdolhossein. / Taxonomy of malware detection techniques : A systematic literature review. 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016. Institute of Electrical and Electronics Engineers Inc., 2016. pp. 629-636
@inproceedings{aee2018dc2334451aab246d2a59206f0,
title = "Taxonomy of malware detection techniques: A systematic literature review",
abstract = "Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends on the technology used. Therefore, it is paramount that the advantages and disadvantages of each type of technology are scrutinized analytically. This study's aim is to scrutinize existing publications on this subject and to follow the trend that has taken place in the advancement and development with reference to the amount of information and sources of such literature. Many of the malware programs are huge and complicated and it is not easy to comprehend the details. Dissemination of malware information among users of the Internet and also training them to correctly use anti-malware products are crucial to protecting users from the malware onslaught. This paper will provide an exhaustive bibliography of methods to assist in combating malware.",
keywords = "Anomaly-based, Malicious code, Malware, Signature-based, System requirements, Taxonomy",
author = "Deylami, {Hanif Mohaddes} and Muniyandi, {Ravie Chandren} and Ardekani, {Iman Tabatabaei} and Abdolhossein Sarrafzadeh",
year = "2016",
doi = "10.1109/PST.2016.7906998",
language = "English",
pages = "629--636",
booktitle = "2016 14th Annual Conference on Privacy, Security and Trust, PST 2016",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Taxonomy of malware detection techniques

T2 - A systematic literature review

AU - Deylami, Hanif Mohaddes

AU - Muniyandi, Ravie Chandren

AU - Ardekani, Iman Tabatabaei

AU - Sarrafzadeh, Abdolhossein

PY - 2016

Y1 - 2016

N2 - Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends on the technology used. Therefore, it is paramount that the advantages and disadvantages of each type of technology are scrutinized analytically. This study's aim is to scrutinize existing publications on this subject and to follow the trend that has taken place in the advancement and development with reference to the amount of information and sources of such literature. Many of the malware programs are huge and complicated and it is not easy to comprehend the details. Dissemination of malware information among users of the Internet and also training them to correctly use anti-malware products are crucial to protecting users from the malware onslaught. This paper will provide an exhaustive bibliography of methods to assist in combating malware.

AB - Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends on the technology used. Therefore, it is paramount that the advantages and disadvantages of each type of technology are scrutinized analytically. This study's aim is to scrutinize existing publications on this subject and to follow the trend that has taken place in the advancement and development with reference to the amount of information and sources of such literature. Many of the malware programs are huge and complicated and it is not easy to comprehend the details. Dissemination of malware information among users of the Internet and also training them to correctly use anti-malware products are crucial to protecting users from the malware onslaught. This paper will provide an exhaustive bibliography of methods to assist in combating malware.

KW - Anomaly-based

KW - Malicious code

KW - Malware

KW - Signature-based

KW - System requirements

KW - Taxonomy

UR - http://www.scopus.com/inward/record.url?scp=85019195641&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85019195641&partnerID=8YFLogxK

U2 - 10.1109/PST.2016.7906998

DO - 10.1109/PST.2016.7906998

M3 - Conference contribution

SP - 629

EP - 636

BT - 2016 14th Annual Conference on Privacy, Security and Trust, PST 2016

PB - Institute of Electrical and Electronics Engineers Inc.

ER -