Guide for Modelling a Network Flow-Based Detection System for Malware Categorization: A Review of Related Literature

Guide for Modelling a Network Flow-Based Detection System for Malware Categorization: A Review of Related Literature

Joshua Chibuike Sopuru (Girne American University, Cyprus) and Murat Akkaya (Girne American University, Cyprus)
DOI: 10.4018/978-1-5225-8976-1.ch007

Abstract

Improved technology has led to significant changes in society over time. This has been accompanied by significant changes in the economy. The improvement in technology has also been accompanied by significant changes in the modeling of network-based systems. This is comprised of significant updates of computer and mobile operating systems. The development of mobile phones and operating systems have endangered essential individual and corporate data over time by making it vulnerable and prone to viruses, worms, and malware. This chapter focuses on reviewing literature that serves as guides for modeling a network flow-based detection system for malware categorization. The Author begins with an in-depth definition of mobile devices and how they have eased the spread of malicious software. Identifying Android OS as the most used operating system, Android OS operating system layer was explained, and the reason for user preferability unveiled. The chapter continued with a review of known malware and their behaviors as has been observed over time.
Chapter Preview
Top

Definition Of Terms

  • Malware: A software developed with the intension of causing harm to computers or mobile devices.

  • Anti-Malware Programs: Software/program designed precisely to protect devices against malware.

  • Operating Systems: System software that enables computers or mobile phones to perform fundamental computing activities.

  • Malware Detection: It is the ability to identify harmful pattern of malware before harm is caused on the target machine.

  • Malware Spreading: the ability of malicious viruses or dangerous malware to multiply themselves and replicate to other devices.

  • Malware Evasion: Different ways or methods through which invasion by malware can be essentially detected and handled.

  • Malware Categorization: Ability to effectively define malware into groups based on some recognized characteristics.

  • Cybercrimes: Illegal Activities intended to cause harm. It is usually associated with utilization of computer networks.

Complete Chapter List

Search this Book:
Reset