Reference Hub4
Metamorphic Malware Analysis and Detection Methods

Metamorphic Malware Analysis and Detection Methods

P. Vinod, V. Laxmi, M.S. Gaur
ISBN13: 9781609601232|ISBN10: 1609601238|EISBN13: 9781609601256
DOI: 10.4018/978-1-60960-123-2.ch013
Cite Chapter Cite Chapter

MLA

Vinod, P., et al. "Metamorphic Malware Analysis and Detection Methods." Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, edited by Raghu Santanam, et al., IGI Global, 2011, pp. 178-202. https://doi.org/10.4018/978-1-60960-123-2.ch013

APA

Vinod, P., Laxmi, V., & Gaur, M. (2011). Metamorphic Malware Analysis and Detection Methods. In R. Santanam, M. Sethumadhavan, & M. Virendra (Eds.), Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives (pp. 178-202). IGI Global. https://doi.org/10.4018/978-1-60960-123-2.ch013

Chicago

Vinod, P., V. Laxmi, and M.S. Gaur. "Metamorphic Malware Analysis and Detection Methods." In Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, edited by Raghu Santanam, M. Sethumadhavan, and Mohit Virendra, 178-202. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-123-2.ch013

Export Reference

Mendeley
Favorite

Abstract

The term ‘malware’ is collectively used for any program which accesses the system through surreptitious (often unauthorized) means, with malicious intent, resulting in data loss and/or corruption. Some examples are viruses, worms, trojans, botnets etc. Malware is becoming a world-wide epidemic as one infected computer system may compromise all networked systems. Millions of computers connected to the Internet exchange useful data and information and are exposed to malware threats. Malware programs may apply different techniques for unauthorized access, but all of them compromise the system in one way or another. In order to protect from the threats imposed by the malware, we need to understand the techniques used by them in exploiting system vulnerabilities and build an effective detection system. This contribution chapter surveys various malware types, infection mechanisms, detection techniques and metamorphic viruses. This chapter also presents a Longest Common Subsequence (LCS) based methodology for metamorphic malware detection.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.