Open Access Open Access  Restricted Access Subscription Access

Malware Detection in Applications using a Virtual Environment

Jagriti Kumari, Sowmya B

Abstract


Malware assaults amongst diverse cyber-attack on computers are deemed harmful, as they are passive and sleathy. A malware assault is a cyber-attack that initiates the action of the perpetrator on the system of the victim. Adware, spyware, keyloggers and any other malware may be used to carry out malware attacks. Spyware captures information from companies or individuals and distributes it to harmful users. The Spyware keylogger records, logs and transmits the user's keystrokes to the virus attacker. These threats must be recognised and identified to ensure adequate data protection. Early detection helps to slow the spread of malware. This paper provides a methodology for logging and testing spyware attacks.


Full Text:

PDF

References


Wazid, M., Katal, A., Goudar, R. H., Singh, D. P., Tyagi, A., Sharma, R., & Bhakuni, P. (2013, January). A framework for detection and prevention of novel keylogger spyware attacks. In 2013 7th International Conference on Intelligent Systems and Control (ISCO) (pp. 433-438). IEEE.

Shahzad, R. K., Haider, S. I., & Lavesson, N. (2010, February). Detection of spyware by mining executable files. In 2010 International Conference on Availability, Reliability and Security (pp. 295-302). IEEE.

Sheta, M. A., Zaki, M., & El Hadad, K. A. E. S. (2016, July). Anti-spyware security design patterns. In 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC) (pp. 465-470). IEEE.

Solairaj, A., Prabanand, S. C., Mathalairaj, J., Prathap, C., & Vignesh, L. S. (2016, January). Keyloggers software detection techniques. In 2016 10th International Conference on Intelligent Systems and Control (ISCO) (pp. 1-6). IEEE

Wood, C., & Raj, R. (2010, July). Keyloggers in Cybersecurity Education. In Security and Management (pp. 293-299).

Tyagi, G., Ahmad, K., & Doja, M. N. (2014, February). A novel framework for password securing system from key-logger spyware. In 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) (pp. 70-74). IEEE.

Javaheri, D., Hosseinzadeh, M., & Rahmani, A. M. (2018). Detection and elimination of spyware and ransomware by intercepting kernel-level system routines. IEEE Access, 6, 78321-78332.

Mallikarajunan, K. N., Preethi, S. R., Selvalakshmi, S., & Nithish, N. (2019, April). Detection of spyware in software using virtual environment. In 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1138-1142). IEEE.

Menon, K. D., Raj Jain, A., & Kumar Pareek, D. (2019). Quantitative analysis of student data mining.

Pai H, A., HS, S., Soman, S., Pareek, D., & Kumar, P. (2019). Analysis of causes and effects of longer lead time in software process using FMEA SSRN: https://ssrn.com/abstract=3508574 or

http://dx.doi.org/10.2139/ssrn.3508574


Refbacks

  • There are currently no refbacks.