Malware Attack and Malware Analysis: A Research
VerifiedAdded on 2022/10/04
|9
|2293
|146
AI Summary
This research paper examines the impact of security threats, attacks, and malware on organizational performance. It includes a journal paper and evaluates the malware attacks. The paper highlights the issues related to malware and security threats, research methods, research design, data collection, data analysis, findings, and results. The subject is computer science and the document type is a research paper.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
RESEARCH PAPER
0
NAME STUDENT ID
Threats attacks and malware
Article: Chakraborty, S., (2019)
Malware attack and Malware
Analysis: A Research
0
NAME STUDENT ID
Threats attacks and malware
Article: Chakraborty, S., (2019)
Malware attack and Malware
Analysis: A Research
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
RESEARCH PAPER
Table of Contents
Introduction.................................................................................................................................................2
The intention of the paper..........................................................................................................................2
Research methods.......................................................................................................................................3
Research approach..................................................................................................................................3
Research design.......................................................................................................................................4
Data collection.........................................................................................................................................4
Data analysis............................................................................................................................................4
Findings or results.......................................................................................................................................5
Issues highlighted........................................................................................................................................5
Conclusion of the article..............................................................................................................................5
Conclusion...................................................................................................................................................6
References...................................................................................................................................................7
1
NAME STUDENT ID
Table of Contents
Introduction.................................................................................................................................................2
The intention of the paper..........................................................................................................................2
Research methods.......................................................................................................................................3
Research approach..................................................................................................................................3
Research design.......................................................................................................................................4
Data collection.........................................................................................................................................4
Data analysis............................................................................................................................................4
Findings or results.......................................................................................................................................5
Issues highlighted........................................................................................................................................5
Conclusion of the article..............................................................................................................................5
Conclusion...................................................................................................................................................6
References...................................................................................................................................................7
1
NAME STUDENT ID
RESEARCH PAPER
Introduction
In this generation, the rate of security threats is increasing quickly where the attackers
transfer the fraud signs to the computer networks used by the organizations. Malware is a
security threat which directly impacts on the individual information of the users and
businesses [1]. Malware is software that helps the criminals to achieve hacking activities in
the companies and business communities. The major focus of this research is to examine
the impact of security threats, attacks, and malware on organizational performance. For
better understanding, a journal paper will be included and evaluated based on the malware
attacks. This article will comprise many sections such as the information of the article,
research approaches used, key issues tinted by the investigators and findings of the paper.
The intention of the paper
The name of the article is Malware attack and Malware Analysis: A Research that was
provided by Soumen [1]. The significance of this paper is to identify and evaluate the
impacts of a malware attack on the computer systems used by the users. According to the
author, malware analysis is the manner of evaluating the impacts of security threats and
malware signals on the personal information of the consumers. It is identified that malware
is software used by hackers for controlling and accessing private data of the users without
taking their authorization [2].
The researchers identified that with the enhancement of internet connections many
consumers are moving towards computer networks and systems due to which the hackers
are able to attack on these networks and access the computing devices used by the
consumers. In recent years, malware has been defined as a security attack that has the
potential to perform data breach-related issues in business communities. MacAfee
identified thousands of viruses and malware signals from the computer devices and it is
true that the usage of third gatherings may produce malware related problems in the
devices [3].
2
NAME STUDENT ID
Introduction
In this generation, the rate of security threats is increasing quickly where the attackers
transfer the fraud signs to the computer networks used by the organizations. Malware is a
security threat which directly impacts on the individual information of the users and
businesses [1]. Malware is software that helps the criminals to achieve hacking activities in
the companies and business communities. The major focus of this research is to examine
the impact of security threats, attacks, and malware on organizational performance. For
better understanding, a journal paper will be included and evaluated based on the malware
attacks. This article will comprise many sections such as the information of the article,
research approaches used, key issues tinted by the investigators and findings of the paper.
The intention of the paper
The name of the article is Malware attack and Malware Analysis: A Research that was
provided by Soumen [1]. The significance of this paper is to identify and evaluate the
impacts of a malware attack on the computer systems used by the users. According to the
author, malware analysis is the manner of evaluating the impacts of security threats and
malware signals on the personal information of the consumers. It is identified that malware
is software used by hackers for controlling and accessing private data of the users without
taking their authorization [2].
The researchers identified that with the enhancement of internet connections many
consumers are moving towards computer networks and systems due to which the hackers
are able to attack on these networks and access the computing devices used by the
consumers. In recent years, malware has been defined as a security attack that has the
potential to perform data breach-related issues in business communities. MacAfee
identified thousands of viruses and malware signals from the computer devices and it is
true that the usage of third gatherings may produce malware related problems in the
devices [3].
2
NAME STUDENT ID
RESEARCH PAPER
The researcher identified that malware is a preferred time period utilized to refer to a
ramification of dangerous computer software. There are numerous types of malware
attacks faced by the companies while accessing computer networks through unauthorized
networks including, Trojan horse, worms, spyware, and adware. It is observed that
malware may be stealthy portions of software that has the potential to reduce the efficacy
of the processor devices and help the hackers for implementing security attacks in less
time [4].
It is true that the involvement of third-party networks and unwanted signals in the systems
may lead the safety intimidations in the communities. Spyware is a shared security dose
confronted by the companies where the criminal’s transmission the circulation signs to the
consumer’s networks and block security systems by which they can easily enter into the
systems and encode the personal data of the users [5]. The authors defined that the Trojan
horse is a part of a malware attack that misrepresents the software networks and produces
hacking issues in the IT systems used by the companies.
In order to analyze and handle malware-related attacks, the researcher used static
malware analysis methodology that has the potential to identify the risk factors linked with
the computing programs [6]. Moreover, the researchers also highlighted the tools used for
analyzing malware attacks and security threats and included the opinions of other
researchers for managing the flow of facts in the entire investigation. It is identified that
the consumers should use only secured networks because the criminals produce third
party servers and unauthorized servers in order to detect the passwords of the user’s
accounts. This proposed research critically examined and analyzed the malware and other
security attacks associated with computer devices.
Research methods
Research approach
There are 2 types of methods used in the study such as inductive and deductive. In which
the inductive approach is used for pooling the collected data towards research objectives
and goals while deductive research is to provide an effective hypothesis of the investigation
3
NAME STUDENT ID
The researcher identified that malware is a preferred time period utilized to refer to a
ramification of dangerous computer software. There are numerous types of malware
attacks faced by the companies while accessing computer networks through unauthorized
networks including, Trojan horse, worms, spyware, and adware. It is observed that
malware may be stealthy portions of software that has the potential to reduce the efficacy
of the processor devices and help the hackers for implementing security attacks in less
time [4].
It is true that the involvement of third-party networks and unwanted signals in the systems
may lead the safety intimidations in the communities. Spyware is a shared security dose
confronted by the companies where the criminal’s transmission the circulation signs to the
consumer’s networks and block security systems by which they can easily enter into the
systems and encode the personal data of the users [5]. The authors defined that the Trojan
horse is a part of a malware attack that misrepresents the software networks and produces
hacking issues in the IT systems used by the companies.
In order to analyze and handle malware-related attacks, the researcher used static
malware analysis methodology that has the potential to identify the risk factors linked with
the computing programs [6]. Moreover, the researchers also highlighted the tools used for
analyzing malware attacks and security threats and included the opinions of other
researchers for managing the flow of facts in the entire investigation. It is identified that
the consumers should use only secured networks because the criminals produce third
party servers and unauthorized servers in order to detect the passwords of the user’s
accounts. This proposed research critically examined and analyzed the malware and other
security attacks associated with computer devices.
Research methods
Research approach
There are 2 types of methods used in the study such as inductive and deductive. In which
the inductive approach is used for pooling the collected data towards research objectives
and goals while deductive research is to provide an effective hypothesis of the investigation
3
NAME STUDENT ID
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
RESEARCH PAPER
[7]. In this journal paper, the researcher adopted the inductive approach as it is capable to
provide depth examination about research questions. Moreover, this methodology helped
for enhancing the reliability of data and enhancing the quality of the investigation.
Research design
The researchers used qualitative design while conducting the investigation and collected
data from the previous papers and observation in the context of malware attack. It is
argued that the use of qualitative design supported the researchers for finding effective
points in the relation of malware and security threats. Therefore, using this type of design
the researcher was capable to handle gaps in the entire research and managed the research
questions effectively [8]. The qualitative design mainly allowed the investigators to obtain
subjective data about malware and security threats.
Data collection
It is the key section of the study as it provides a platform to pool information towards the
aims of the investigation. Primary and secondary both are common methods used for
gathering effective information about research. In this research secondary data was
obtained by the writer due to the subjective behavior of the research. To obtain secondary
data, the writer developed a literature review and adopted information from the online
websites, journal papers and other resources [9]. So, including this type of data the
researcher was capable to find the risk factors that produce malware and security risks in
the computer networks.
Data analysis
After collecting the reliable data the researcher requires a platform to analyze and examine
the effective points from the research. Data analysis provides a way to understand research
concerns and manage the gaps from the research. In this article, the writer adopted two
methods for analyzing malware including static method and dynamic technique because of
their potential to identify the key issues linked with the computer networks. Therefore,
including such kinds of methodologies the researcher was able to achieve goals of the
research and reached the deduction of the study.
4
NAME STUDENT ID
[7]. In this journal paper, the researcher adopted the inductive approach as it is capable to
provide depth examination about research questions. Moreover, this methodology helped
for enhancing the reliability of data and enhancing the quality of the investigation.
Research design
The researchers used qualitative design while conducting the investigation and collected
data from the previous papers and observation in the context of malware attack. It is
argued that the use of qualitative design supported the researchers for finding effective
points in the relation of malware and security threats. Therefore, using this type of design
the researcher was capable to handle gaps in the entire research and managed the research
questions effectively [8]. The qualitative design mainly allowed the investigators to obtain
subjective data about malware and security threats.
Data collection
It is the key section of the study as it provides a platform to pool information towards the
aims of the investigation. Primary and secondary both are common methods used for
gathering effective information about research. In this research secondary data was
obtained by the writer due to the subjective behavior of the research. To obtain secondary
data, the writer developed a literature review and adopted information from the online
websites, journal papers and other resources [9]. So, including this type of data the
researcher was capable to find the risk factors that produce malware and security risks in
the computer networks.
Data analysis
After collecting the reliable data the researcher requires a platform to analyze and examine
the effective points from the research. Data analysis provides a way to understand research
concerns and manage the gaps from the research. In this article, the writer adopted two
methods for analyzing malware including static method and dynamic technique because of
their potential to identify the key issues linked with the computer networks. Therefore,
including such kinds of methodologies the researcher was able to achieve goals of the
research and reached the deduction of the study.
4
NAME STUDENT ID
RESEARCH PAPER
Findings or results
From this paper, the writer found that malware is a serious safety occurrence faced by the
companies where the offenders send unwelcome signals to the systems in order to enter
into the computing devices [9]. This research shows the negative impacts of malware
software on computing devices and personal data of the companies. It is observed that
spyware and Trojan horse both common security attacks occurred in the business
communities. This research also evaluated and analyzed the key factors that lead to
security-related problems in companies. The highlighted tools are capable to identify the
viruses and traffic signals transferred by the malware and manage the privacy of data in an
appropriate manner [12].
Issues highlighted
Security threat is a key issue associated with the computing devices and networks due to
which the companies can suffer from hacking related problems. In this paper, the
researchers evaluated the malware and security issues faced by the consumers while
including computer devices and networks [10]. It is true that a lack of proper configuration
is a major problem that enhances security attacks and malware activities in the systems
[11]. The use of computer devices requires proper security in order to handle malware
related issues from the schemes.
Conclusion of the article
The researcher concluded that malware is a kind of security threat that may affect the
personal information of the consumers. The analysis of malware was done by the
researcher using static and dynamic models and identified the key factors due to which the
users suffer from the hacking issues. This proposed paper observed and evaluated the
types of malware attacks and provided effective tools by which the consumers can detect
and handle malware signals from the computing devices. In which dynamic malware
analysis is an effective approach as compared with the static because of their larger
accuracy to evaluate and analyze the malware issues. this paper is based on the malware
5
NAME STUDENT ID
Findings or results
From this paper, the writer found that malware is a serious safety occurrence faced by the
companies where the offenders send unwelcome signals to the systems in order to enter
into the computing devices [9]. This research shows the negative impacts of malware
software on computing devices and personal data of the companies. It is observed that
spyware and Trojan horse both common security attacks occurred in the business
communities. This research also evaluated and analyzed the key factors that lead to
security-related problems in companies. The highlighted tools are capable to identify the
viruses and traffic signals transferred by the malware and manage the privacy of data in an
appropriate manner [12].
Issues highlighted
Security threat is a key issue associated with the computing devices and networks due to
which the companies can suffer from hacking related problems. In this paper, the
researchers evaluated the malware and security issues faced by the consumers while
including computer devices and networks [10]. It is true that a lack of proper configuration
is a major problem that enhances security attacks and malware activities in the systems
[11]. The use of computer devices requires proper security in order to handle malware
related issues from the schemes.
Conclusion of the article
The researcher concluded that malware is a kind of security threat that may affect the
personal information of the consumers. The analysis of malware was done by the
researcher using static and dynamic models and identified the key factors due to which the
users suffer from the hacking issues. This proposed paper observed and evaluated the
types of malware attacks and provided effective tools by which the consumers can detect
and handle malware signals from the computing devices. In which dynamic malware
analysis is an effective approach as compared with the static because of their larger
accuracy to evaluate and analyze the malware issues. this paper is based on the malware
5
NAME STUDENT ID
RESEARCH PAPER
and security threats which are the topic of study and reading this paper the readers can
demonstrate their experience in the relation of malware attacks.
Conclusion
From this study, it may be summarized that malware is a major problem that may produce
data breach issues in companies. This report critically evaluated and explored the malware
and security threats related to the computer devices and obtained the effective points in
the context of malware. The selected journal provided depth information about malware
and highlighted effective tools for finding the key points related to malware. Therefore, it is
recommended that consumers must ensure that they use secured networks and systems to
defend data beside malware.
6
NAME STUDENT ID
and security threats which are the topic of study and reading this paper the readers can
demonstrate their experience in the relation of malware attacks.
Conclusion
From this study, it may be summarized that malware is a major problem that may produce
data breach issues in companies. This report critically evaluated and explored the malware
and security threats related to the computer devices and obtained the effective points in
the context of malware. The selected journal provided depth information about malware
and highlighted effective tools for finding the key points related to malware. Therefore, it is
recommended that consumers must ensure that they use secured networks and systems to
defend data beside malware.
6
NAME STUDENT ID
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
RESEARCH PAPER
References
[1].S., Chakraborty, “Malware attack and Malware Analysis: A Research, International
Journal of Scientific Research in Computer Science, Engineering and Information
Technology, vol. 5, no. 3, pp. 4-10, 2019.
[2].S., Mohurle and, M. Patil, “A brief study of wannacry threat: Ransomware attack
2017,” International Journal of Advanced Research in Computer Science, vol. 8, no. 5,
pp. 12-18, 2017.
[3].M., Schwarz, S., Weiser, D., Gruss, C., Maurice and S, Mangard, “Malware guard
extension: Using SGX to conceal cache attacks,” In International Conference on
Detection of Intrusions and Malware, and Vulnerability Assessment, vol. 12, no. 7, pp.
3-24, 2017.
[4].H., Al-Mohannadi, Q., Mirza, A., Namanya, I., Awan, A., Cullen and, J. Disso, “Cyber-
attack modeling analysis techniques: An overview,” In 2016 IEEE 4th International
Conference on Future Internet of Things and Cloud Workshops (FiCloudW), vol. 12, no.
7, pp. 69-76, 2016.
[5].F. L., Lévesque, S., Chiasson, A., Somayaji and, J. M. Fernandez, “Technological and
human factors of malware attacks: A computer security clinical trial approach,” ACM
Transactions on Privacy and Security (TOPS), vol. 21, no. 4, p.18, 2018.
[6].G., Meng, Y., Xue, C., Mahinthan, A., Narayanan, Y., Liu, J., Zhang and, T. Chen,
“Mystique: Evolving android malware for auditing anti-malware tools,”
In Proceedings of the 11th ACM on Asia conference on computer and communications
security, vol. 8, no. 6, pp. 365-376, 2016.
[7].B., Kolosnjaji, A., Demontis, B., Biggio, D., Maiorca, G., Giacinto, C., Eckert and, F. Roli,
“Adversarial malware binaries: Evading deep learning for malware detection in
executables,” In 2018 26th European Signal Processing Conference (EUSIPCO), vol. 8,
no. 6, pp. 533-537, 2018.
[8].E. R., Leukfeldt, E. R., Kleemans and, W. P. Stol, “Cybercriminal networks, social ties,
and online forums: social ties versus digital ties within phishing and malware
networks,” The British Journal of Criminology, vol. 57, no. 3, pp. 704-722, 2017.
7
NAME STUDENT ID
References
[1].S., Chakraborty, “Malware attack and Malware Analysis: A Research, International
Journal of Scientific Research in Computer Science, Engineering and Information
Technology, vol. 5, no. 3, pp. 4-10, 2019.
[2].S., Mohurle and, M. Patil, “A brief study of wannacry threat: Ransomware attack
2017,” International Journal of Advanced Research in Computer Science, vol. 8, no. 5,
pp. 12-18, 2017.
[3].M., Schwarz, S., Weiser, D., Gruss, C., Maurice and S, Mangard, “Malware guard
extension: Using SGX to conceal cache attacks,” In International Conference on
Detection of Intrusions and Malware, and Vulnerability Assessment, vol. 12, no. 7, pp.
3-24, 2017.
[4].H., Al-Mohannadi, Q., Mirza, A., Namanya, I., Awan, A., Cullen and, J. Disso, “Cyber-
attack modeling analysis techniques: An overview,” In 2016 IEEE 4th International
Conference on Future Internet of Things and Cloud Workshops (FiCloudW), vol. 12, no.
7, pp. 69-76, 2016.
[5].F. L., Lévesque, S., Chiasson, A., Somayaji and, J. M. Fernandez, “Technological and
human factors of malware attacks: A computer security clinical trial approach,” ACM
Transactions on Privacy and Security (TOPS), vol. 21, no. 4, p.18, 2018.
[6].G., Meng, Y., Xue, C., Mahinthan, A., Narayanan, Y., Liu, J., Zhang and, T. Chen,
“Mystique: Evolving android malware for auditing anti-malware tools,”
In Proceedings of the 11th ACM on Asia conference on computer and communications
security, vol. 8, no. 6, pp. 365-376, 2016.
[7].B., Kolosnjaji, A., Demontis, B., Biggio, D., Maiorca, G., Giacinto, C., Eckert and, F. Roli,
“Adversarial malware binaries: Evading deep learning for malware detection in
executables,” In 2018 26th European Signal Processing Conference (EUSIPCO), vol. 8,
no. 6, pp. 533-537, 2018.
[8].E. R., Leukfeldt, E. R., Kleemans and, W. P. Stol, “Cybercriminal networks, social ties,
and online forums: social ties versus digital ties within phishing and malware
networks,” The British Journal of Criminology, vol. 57, no. 3, pp. 704-722, 2017.
7
NAME STUDENT ID
RESEARCH PAPER
[9].M. F., Ab Razak, N. B., Anuar, R., Salleh and, A. Firdaus, “The rise of “malware”:
Bibliometric analysis of malware study,” Journal of Network and Computer
Applications, vol. 75, no. 6, pp. 58-76, 2016.
[10]. S., Das, H., Xiao, Y., Liu and, W. Zhang, “Online malware defense using attack
behavior model,” In 2016 IEEE International Symposium on Circuits and Systems
(ISCAS), vol. 8, no. 5, pp. 1322-1325, 2016.
[11]. L., Chen, Y., Ye and, T. Bourlai, “Adversarial machine learning in malware
detection: Arms race between evasion attack and defense,” In 2017 European
Intelligence and Security Informatics Conference (EISIC), vol. 12, no. 7, pp. 99-106,
2017.
[12]. I., Rosenberg, A., Shabtai, L., Rokach and, Y. Elovici, “The generic black-box
end-to-end attack against state of the art API call based malware classifiers,” In
International Symposium on Research in Attacks, Intrusions, and Defenses, vol. 12, no.
6, 490-510, 2018.
8
NAME STUDENT ID
[9].M. F., Ab Razak, N. B., Anuar, R., Salleh and, A. Firdaus, “The rise of “malware”:
Bibliometric analysis of malware study,” Journal of Network and Computer
Applications, vol. 75, no. 6, pp. 58-76, 2016.
[10]. S., Das, H., Xiao, Y., Liu and, W. Zhang, “Online malware defense using attack
behavior model,” In 2016 IEEE International Symposium on Circuits and Systems
(ISCAS), vol. 8, no. 5, pp. 1322-1325, 2016.
[11]. L., Chen, Y., Ye and, T. Bourlai, “Adversarial machine learning in malware
detection: Arms race between evasion attack and defense,” In 2017 European
Intelligence and Security Informatics Conference (EISIC), vol. 12, no. 7, pp. 99-106,
2017.
[12]. I., Rosenberg, A., Shabtai, L., Rokach and, Y. Elovici, “The generic black-box
end-to-end attack against state of the art API call based malware classifiers,” In
International Symposium on Research in Attacks, Intrusions, and Defenses, vol. 12, no.
6, 490-510, 2018.
8
NAME STUDENT ID
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.