International Journal on Science and Technology

E-ISSN: 2229-7677     Impact Factor: 9.88

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 16 Issue 1 January-March 2025 Submit your research before last 3 days of March to publish your research paper in the issue of January-March.

A COMPREHENSIVE REVIEW ON MALWARE DETECTION TECHNIQUES

Author(s) UNNIMAYA M U
Country India
Abstract Malware programs pose a significant threat as they
are designed to disrupt computer systems and propagate through
networks or Internet connections. Researchers are actively developing anti-malware systems aimed at effectively detecting
and protecting against these threats. Two primary approaches
have been proposed: signature-based detection, which relies
on identifying known malware through specific patterns or
signatures, and heuristic-based detection, which utilizes rules
to identify potentially malicious behavior. However, signaturebased techniques are often ineffective against unknown malware
variants and sophisticated evasion techniques such as code
obfuscation, packing, polymorphism, and metamorphism. This
survey paper provides an overview of current methodologies for
detecting and analyzing malicious code, including static analysis,
dynamic analysis, and hybrid approaches.
Keywords Malware detection, Security, Survey, Malicious programs, Static analysis, Dynamic analysis, Hybrid Analysis
Field Engineering
Published In Volume 16, Issue 1, January-March 2025
Published On 2025-01-17
Cite This A COMPREHENSIVE REVIEW ON MALWARE DETECTION TECHNIQUES - UNNIMAYA M U - IJSAT Volume 16, Issue 1, January-March 2025. DOI 10.71097/IJSAT.v16.i1.1428
DOI https://doi.org/10.71097/IJSAT.v16.i1.1428
Short DOI https://doi.org/g82pb2

Share this