

Application-Level Malware Detection Using a Virtual Environment
Abstract
Malware attacks among different digital assaults on PCs are considered hurtful, as they are detached and sleathy. A malware attack is a digital assault that starts the activity of the culprit on the arrangement of the person in question. Adware, spyware, keyloggers and some other malware might be utilized to complete malware assaults. Spyware catches data from organizations or people and disseminates it to destructive clients. The Spyware keylogger records logs and communicates the client's keystrokes to the infection assailant. These dangers should be perceived and recognized to guarantee satisfactory information security. Early identification assists with easing back the spread of malware. This paper gives a strategy to logging and testing spyware assaults.
References
Wazid, M., Katal, A., Goudar, R. H., Singh, D. P., Tyagi, A., Sharma, R., & Bhakuni, P. (2013, January). A framework for detection and prevention of novel keylogger spyware attacks. In 2013 7th International Conference on Intelligent Systems and Control (ISCO) (pp. 433-438). IEEE.
Shahzad, R. K., Haider, S. I., & Lavesson, N. (2010, February). Detection of spyware by mining executable files. In 2010 International Conference on Availability, Reliability and Security (pp. 295-302). IEEE.
Sheta, M. A., Zaki, M., & El Hadad,
K. A. E. S. (2016, July). Anti-spyware security design patterns. In 2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC) (pp. 465-470). IEEE.
Solairaj, A., Prabanand, S. C., Mathalairaj, J., Prathap, C., & Vignesh, L. S. (2016, January). Keyloggers software detection techniques. In 2016 10th International Conference on Intelligent Systems and Control (ISCO) (pp. 1-6). IEEE
5. Wood, C., & Raj, R. (2010, July). Keyloggers in Cybersecurity Education. In Security and Management (pp. 293-299).
Tyagi, G., Ahmad, K., & Doja, M. N. (2014, February). A novel framework for password securing system from key-logger spyware. In 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT) (pp. 70-74). IEEE.
Javaheri, D., Hosseinzadeh, M., & Rahmani, A. M. (2018). Detection and elimination of spyware and ransomware by intercepting kernel- level system routines. IEEE Access, 6, 78321-78332.
Mallikarajunan, K. N., Preethi, S. R., Selvalakshmi, S., & Nithish, N. (2019, April). Detection of spyware in software using virtual environment. In 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI) (pp. 1138-1142). IEEE.
Menon, K. D., Raj Jain, A., & Kumar Pareek, D. (2019). Quantitative analysis of student data mining.
Refbacks
- There are currently no refbacks.