The rise of malware

作者: Mohd Faizal Ab Razak , Nor Badrul Anuar , Rosli Salleh , Ahmad Firdaus

DOI: 10.1016/J.JNCA.2016.08.022

关键词:

摘要: Malicious software (malware) is a computer program designed to create harmful and undesirable effects. It considered as one of the many dangerous threats for Internet users. Rootkit, botnet, worm, spyware Trojan horse are most common types malware. Most malware studies aim investigate novel approaches preventing, detecting responding threats. However, despite articles published support research activities, there still no trace any bibliometric report that demonstrates trends. This paper aims fill in gap by presenting comprehensive evaluation practices. begins looking at pool over 4000 between 2005 2015 ISI Web Science database. Using analysis, this discusses activities done both North America, Asia other continents. performed detailed analysis number published, citations, area, keywords, institutions, terms, authors. A summary continues listing terms into classification detection system which underlines important area research. From it was concluded several significant impacts Asia, comparison In particular, papers Asian countries such China, Korea, India, Singapore Malaysia relation Middle East America. Presents using Knowledge database.Presents discussion upon trends related malware.Review on systems.Highlights challenges future system.

参考文章(117)
Matthias Schmidt, Lars Baumgartner, Pablo Graubner, David Bock, Bernd Freisleben, Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments parallel, distributed and network-based processing. pp. 603- 610 ,(2011) , 10.1109/PDP.2011.45
G.J. Pottie, Wireless sensor networks information theory workshop. pp. 139- 140 ,(1998) , 10.1109/ITW.1998.706478
Jinshui Sun, Ming-Huang Wang, Yuh-Shan Ho, A historical review and bibliometric analysis of research on estuary pollution. Marine Pollution Bulletin. ,vol. 64, pp. 13- 21 ,(2012) , 10.1016/J.MARPOLBUL.2011.10.034
Asaf Shabtai, Yuval Elovici, Applying Behavioral Detection on Android-Based Devices mobile wireless middleware operating systems and applications. pp. 235- 249 ,(2010) , 10.1007/978-3-642-17758-3_17
Babak Bashari Rad, Suhaimi Ibrahim, Maslin Masrom, Camouflage in Malware: from Encryption to Metamorphism International Journal of Computer Science and Network Security. ,(2012)
Neminath Hubballi, Vinoth Suryanarayanan, Review: False alarm minimization techniques in signature-based intrusion detection systems: A survey Computer Communications. ,vol. 49, pp. 1- 17 ,(2014) , 10.1016/J.COMCOM.2014.04.012
Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, Dawn Song, Design and Evaluation of a Real-Time URL Spam Filtering Service ieee symposium on security and privacy. pp. 447- 462 ,(2011) , 10.1109/SP.2011.25
Peidai Xie, Xicheng Lu, Yongjun Wang, Jinshu Su, Meijian Li, An Automatic Approach to Detect Anti-debugging in Malware Analysis Trustworthy Computing and Services. pp. 436- 442 ,(2013) , 10.1007/978-3-642-35795-4_55
Natalia Stakhanova, Abdullah J. Alzahrani, Ali A. Ghorbani, Hugo Gonzalez, Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones ,(2014)
Nutan Farah, Md. Avishek, Faisal Muhammad, Abdur Rahman, Musharrat Rafni, Dewan Md., Application of Machine Learning Approaches in Intrusion Detection System: A Survey International Journal of Advanced Research in Artificial Intelligence. ,vol. 4, ,(2015) , 10.14569/IJARAI.2015.040302