Malware: Present, Future, and Past Analysis Report on Security

Verified

Added on  2022/11/10

|6
|2946
|81
Report
AI Summary
This report delves into the multifaceted world of malware, providing a comprehensive analysis of its past, present, and future. It begins with a definition of malware as malicious software that compromises data and networks, causing significant damage through viruses, worms, and Trojans. The report explores the evolution of malware, from its initial limitations to its current sophisticated forms, emphasizing the increasing threat of spyware and ransomware. It examines various technologies associated with malware, including viruses, spyware, fake security software, and browser hijacking, and discusses the challenges posed by data breaches and evolving cyberattacks. The report also highlights gaps in existing literature, particularly concerning security threats and prevention techniques. The conclusion underscores the importance of understanding malware to mitigate its risks and suggests areas for future research, such as methods to control and reduce malware threats.
Document Page
INFORMATION SECURITY 0
MALWARES AND THEIR ANALYSIS
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INFORMATION SECURITY 1
Abstract- Malware can be defined as malicious
software or attachments or files that are spread across
the internet via various websites and also via email
attachments. The malware is associated with the data
loss, network breach and spyware in the systems of
the individuals and affects the computers and
networks across a wide range. The malware consists
of various kinds of viruses, worms, and Trojans
which might affect the individual's computers and
might damage important credentials. The malware in
the past was only associated with limitations of the
services of the network or computer and also with the
decrease in their operating speeds. However, the
present malware is more harmful and they provide
greater risks for the computer infrastructures. The
viruses nowadays can spread by itself and also can
multiple themselves without any human intervention.
This causes various problems in computers and can
permanently damage their information. The malware
in the modern world is mainly spread via the internet
and they affect the customers through email
attachments. When the users download the
attachments, the viruses affect the hardware as well
as the software parts of the system and sometimes the
viruses are programmed to multiply by itself, which
causes more problems. However, the future malware
is more focused on the spyware and ransomware and
they want ransom by locking down entire servers or
networks until the ransom are given. With the use of
more complex encryption techniques, the malware
are getting more complex and also harder to decrypt.
Thus this research project deals with the present,
future and past of the malware.
Keywords: malware, decrypt, internet and so
on.
Introduction
Malware is a kind of program which is harmful to the
computer systems because it helps the attackers for
accessing the personal data of the consumers without
their permission. The malware program is
able to perform hacking-related activities in the
computer devices and helps the attackers for
accessing the computing devices used by the
companies. The significance of this paper is to
identify the concept of malware and evaluate the
impacts of malware on the personal data of the
companies [1]. There are various kinds of malware
used in computer devices, for example, Trojan
horses, spyware, and computer viruses and so on. All
these malware are able to perform numerous
functions including encrypting or blocking
consumer’s data, hacking the accounts of the
consumers, reducing the performance of computer
devices, and so on. This report will cover several
sections for example; an overview of the technology,
relevant technologies used in the malware and gaps
in the literature.
Overview of the malware
It is computing software which is capable to access
the personal databases of the companies. It is
identified that malware utilizes numerous physical
and virtual means in order to spread malware which
infects computing devices and systems used by the
companies. Using the concept of malware the hackers
can easily perform security threats and risks in the
companies and reduce the effectiveness of the
computer devices [2]. It is identified that malware
programs may be transferred from one device to
another using the internet, mails and other resources.
The major issue faced by the companies is traffic
signals which are mainly developed by hackers using
malware tools. It is true that the utilization of
unauthorized networks in the computer systems can
lead the data breach problems in the companies.
From the previous study, it is found that malware is
any software that is mainly intended to cause injury
to a processor, client and computer devices. The
major significance of the malware is that it supports
the hackers for performing data breach issues and
reduces the effectiveness of the computing networks.
Arp, et al., (2014) argued that malware is often
created by teams of attackers that looking for
collecting the private data of the consumers.
Malware and their Analysis
Document Page
INFORMATION SECURITY 2
Using the traffic signals developed by malware tools
helps the criminals to collect the accounts details of
the consumers including ID, passwords and profile
pictures that can easily detect in less time. The lack
of security is a major problem linked with computer
networks and malware is able to produce financial
issues in the business communities. From previous
literature, it is found that malware is a file mainly
delivered over the computing network which infects,
steals and explores any nature a hacker wants. The
key characteristic of malware is that it provides a
remote control for the hackers in order to utilize an
infected machine and send spam from the infected
machine for blocking the communication networks.
Relevant technologies used in malware
There are various kinds of technologies and networks
used in the malware which are described below:
Virus
It is a part of the malware attack which is a
communicable agent of minor size and humble
composition which may multiply only in alive cells
of bacteria or plants. In the context of malware, its
impact on computer networks and devices and reduce
the effectiveness of the developed systems [3]. It is
observed that many hackers use malicious tools in
order to collect the individual data of the consumers
and viruses are able to block the computing networks
linked with the IT systems.
Applications
Security attacks
Producing problems in the computer
systems
Spyware
It is another major technique used in the hacking that
collects sensitive information and passes it on to third
party servers without taking the permission of the
consumers. The term spyware is also defined as
Trojan viruses that are capable to handle and evaluate
the hacking related problems in the companies. In the
last two years, the rate of spyware has increased by
45% because of their capability to perform the
security attacks and help the hackers for accessing
the private databases of the companies without taking
their permission [4].
Applications
Accessing data of the consumers
Reducing the performance of the networks
Fake security software
In the context of fake security, the hackers produce
the third party networks and software that helps the
attackers to detect the data of the consumers
effectively. Such kind of technology poses as
legitimate computing tools in order to trick enter into
the computer systems used by the companies.
Moreover, such kind of process provides personal
information to the hackers and blocks the
communication channels used by the business
communities [5].
Application
Performing hacking related issues
Browser hijacking software
Such kind of computing technologies used in the
malware for performing the security issues in the
computer devices and help the hackers to detect the
personal information of the companies [6]. Mainly,
browser hijacking software changes the browser
setting of computer devices including home pages
and toolbars and collects the searching history and
saved passwords through malware tools.
Applications
Perform data breach issues
Helps for blocking communication channels
Challenges and issues linked with malware
A data breach is a major problem linked with the
malware software that may be performed by
transferring the unauthorized networks and unwanted
signals to the computer servers. It is observed that
more than 67% of the companies are suffering from
the malware and DDOS attacks that negatively
impact on the computer networks and servers of the
companies [8]. It is observed that the rate of
cybersecurity attacks are growing day by day that
impacts on the privacy of the sensitive data of the
clients and produces breach issues in the
organizations [5].
Recent literature identified that the denial of service
is one of the largest attacks that occurred in the
systems that have the capability to reduce the
effectiveness of the systems and produce the hacking
related problems in the computing devices [12]. It is
true that lack of privacy is the biggest issue linked
with the computing networks and systems and
malware helps the criminals for accessing the
sensitive data of the consumers. Moreover, malware
attack produces unwanted signals and traffic
networks that lead the companies to reduce the
security of the computing networks and perform
Document Page
INFORMATION SECURITY 3
malicious activities in the systems. Malware is often
created by the attackers usually they are just looking
to earn money from the hackers through spreading
the malware signals into the main systems [7].
Therefore, it is very important for the companies to
reduce the unwanted signals from the systems and
enhance the security of data in order to protect data
against malware signals.
Gaps in the literature
It is observed that malware is a common topic for the
research and there are numerous papers were
published in the last five years. Gandotra, Bansal, &
Sofat, (2014) argued that malware is serious
computing software that helps the attackers to block
the networking devices and reduce the performance
of the IT networks used by the companies. It is true
that the utilization of unwanted networks in the
devices that may negatively influence the individual
info of users [11].
From the previous investigation, it is found that the
rate of malware and security attacks are increased by
45% in the last three years due to which the
companies are taking serious to unauthentic networks
and malware attacks. Using the unauthorized access
occurred in the system the criminals can easily enter
into the networks and handle the privacy of the data
without taking the permission of the consumers.
According to Petsas, Voyatzis, Athanasopoulos,
Polychronakis, & Ioannidis, (2014) ransomware is a
common type of malware attack that helps the
hackers for earning money by encrypting the personal
data of the users or companies [8]. After evaluating
the current literature it is identified that the concept
of malware has been addressed by the authors and
also managed the various technologies used in the
malware. It is very significant for the organizations to
handle and reduce the traffic signals from the
networks and manage the performance of the
computer systems in order to enhance the privacy of
the consumer’s data.
From previous literature conducted by Kolosnjaji,
Zarras, Webster, & Eckert, (2016) it is examined that
ransomware is capable of locks down the computer
systems and data files of the companies and earn
ransom from the companies. However, the
researchers have not addressed how to control and
reduce the malware and security threats from the
systems that produced a gap in the research and the
readers are not able to handle the malware attacks
[8]. The lack of security in the companies is another
risk factor that may produce the security threats and
issues in the business communities and support the
hackers to enter into the main servers and reduce the
privacy of the companies [10].
For a better understanding of malware, the authors
conducted literature and identified that malware
produces viruses and traffic signals that can be
transferred from one server to another using internet
connections. Yuan, Lu, Wang, & Xue, (2014)
observed that more than 67% of the hackers use
spyware and phishing process in order to detect the
account details of the user’s systems and also transfer
the spam emails to the consumers that involve a link
for accessing their data [9]. Therefore, it is found that
the current literature has not addressed the issue of
security threats and prevention techniques in the
context of malware. In the current literature, the
authors mainly focused on the working process of
malware and examined the key characteristics of the
malware in the context of data breach and security
threats. Spamming traffic signals in computers is an
important point related to the malware that may
control and delete the personal data of the consumers.
Conclusion and future research
From this research, it can be concluded that malware
helps the attackers to produce unwanted signals and
viruses and perform the data breach activities in the
workplace. This research provided a platform to the
students where they can understand and demonstrate
their skills in the context of malware. It is identified
that ransomware is a major part of the malware which
is suffered by many companies in the last few years.
This research also reviewed and evaluated the
viewpoints of other experts that may help the readers
for identifying the effective points related to the
malware attack.
This paper did not explore the methods and
techniques for protecting data against malware which
produced gaps in the research. Such kind of issues
will be solved in future research where the researcher
will identify the risk factors from the systems and
manage the security of data effectively. Therefore, it
is recommended that companies should implement
security policies and networks in order to reduce the
malware related problems from the systems and
identify and block unwanted signals from the systems
using a firewall and antivirus tools in the computer
systems. Therefore, it is reported that companies
must ensure that employees use only secured
networks and servers and use backup plans in order
to protect data from hackers.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
INFORMATION SECURITY 4
References
[1]. Arp, D., Spreitzenbarth, M., Hubner, M.,
Gascon, H., Rieck, K., & Siemens, C. E. R.
T. (2014). Drebin: Effective and explainable
detection of android malware in your
pocket. In Ndss, 14(6), 23-26.
[2]. Gandotra, E., Bansal, D., & Sofat, S. (2014).
Malware analysis and classification: A
survey. Journal of Information
Security, 5(02), 56.
[3]. Pascanu, R., Stokes, J. W., Sanossian, H.,
Marinescu, M., & Thomas, A. (2015).
Malware classification with recurrent
networks. In 2015 IEEE International
Conference on Acoustics, Speech and Signal
Processing (ICASSP), 12(6), 1916-1920.
[4]. Faruki, P., Bharmal, A., Laxmi, V.,
Ganmoor, V., Gaur, M. S., Conti, M., &
Rajarajan, M. (2014). Android security: a
survey of issues, malware penetration, and
defenses. IEEE communications surveys &
tutorials, 17(2), 998-1022.
[5]. Kirat, D., Vigna, G., & Kruegel, C. (2014).
Barecloud: bare-metal analysis-based
evasive malware detection. In 23rd
{USENIX} Security Symposium ({USENIX}
Security 14), 12(6), 287-301.
[6]. Lindorfer, M., Neugschwandtner, M.,
Weichselbaum, L., Fratantonio, Y., Van Der
Veen, V., & Platzer, C. (2014). Andrubis--
1,000,000 apps later: A view on current
Android malware behaviors. In 2014 third
international workshop on building analysis
datasets and gathering experience returns
for security (BADGERS), 12(8), 3-17.
[7]. Schwarz, M., Weiser, S., Gruss, D.,
Maurice, C., & Mangard, S. (2017).
Malware guard extension: Using SGX to
conceal cache attacks. In International
Conference on Detection of Intrusions and
Malware, and Vulnerability Assessment,
12(9), 3-24).
[8]. Petsas, T., Voyatzis, G., Athanasopoulos, E.,
Polychronakis, M., & Ioannidis, S. (2014).
Rage against the virtual machine: hindering
dynamic analysis of android malware.
In Proceedings of the Seventh European
Workshop on System Security, 8(6), 5.
[9]. Sebastián, M., Rivera, R., Kotzias, P., &
Caballero, J. (2016). Avclass: A tool for
massive malware labeling. In International
Symposium on Research in Attacks,
Intrusions, and Defenses, 8(6), 230-253.
[10]. Kolosnjaji, B., Zarras, A., Webster,
G., & Eckert, C. (2016). Deep learning for
classification of malware system call
Document Page
INFORMATION SECURITY 5
sequences. In Australasian Joint Conference
on Artificial Intelligence, 12(8), 137-149.
[11]. Seo, S. H., Gupta, A., Sallam, A.
M., Bertino, E., & Yim, K. (2014).
Detecting mobile malware threats to
homeland security through static
analysis. Journal of Network and Computer
Applications, 38(7), 43-53.
[12]. Yuan, Z., Lu, Y., Wang, Z., & Xue,
Y. (2014). Droid-sec: deep learning in
android malware detection. In ACM
SIGCOMM Computer Communication
Review, 44(4), 371-372.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]