Reference Hub2
Malware Analysis and Its Mitigation Tools

Malware Analysis and Its Mitigation Tools

ISBN13: 9781668486665|ISBN10: 1668486660|ISBN13 Softcover: 9781668486672|EISBN13: 9781668486689
DOI: 10.4018/978-1-6684-8666-5.ch012
Cite Chapter Cite Chapter

MLA

Janardhana, D. R., et al. "Malware Analysis and Its Mitigation Tools." Malware Analysis and Intrusion Detection in Cyber-Physical Systems, edited by S.L. Shiva Darshan, et al., IGI Global, 2023, pp. 263-284. https://doi.org/10.4018/978-1-6684-8666-5.ch012

APA

Janardhana, D. R., Manu, A. P., Shivanna, K., & Suhas, K. C. (2023). Malware Analysis and Its Mitigation Tools. In S. Shiva Darshan, M. Manoj Kumar, B. Prashanth, & Y. Vishnu Srinivasa Murthy (Eds.), Malware Analysis and Intrusion Detection in Cyber-Physical Systems (pp. 263-284). IGI Global. https://doi.org/10.4018/978-1-6684-8666-5.ch012

Chicago

Janardhana, D. R., et al. "Malware Analysis and Its Mitigation Tools." In Malware Analysis and Intrusion Detection in Cyber-Physical Systems, edited by S.L. Shiva Darshan, et al., 263-284. Hershey, PA: IGI Global, 2023. https://doi.org/10.4018/978-1-6684-8666-5.ch012

Export Reference

Mendeley
Favorite

Abstract

In the present digital era, most of our communication and personal sensitive information are transmitted through smart devices and stored on them. Therefore, it becomes imperative to secure both the device and the data from various security and privacy threats. These threats aim to gain unauthorized access to the data, or worse, destroy it. This chapter presents an overview of malware analysis and its mitigation tools. Malware has become a serious threat to computer systems and networks, and it is important to understand how to analyze and mitigate the risks associated with it. Here, the authors discuss malware and its classification, as well as various techniques used in malware analysis, including static and dynamic analysis. The chapter also presents an overview of the mitigation tools available to prevent and detect malware, including antivirus software, firewalls, intrusion detection systems, and sandboxes. Furthermore, the chapter highlights some of the limitations of these tools and provides insights into the future direction of malware analysis and mitigation.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.