Analysis of Malware Evolution: Past, Present, and Future Trends Report

Verified

Added on  2021/06/16

|10
|3084
|33
Report
AI Summary
This report provides a comprehensive analysis of malware, examining its historical evolution, current threats, and potential future developments. It explores the impact of malware on digital systems, particularly focusing on Android applications and electronic gadgets, highlighting various types of malware like viruses, worms, Trojan horses, spyware, and ransomware. The report delves into research objectives, including the analysis of malware growth, its impact on users, and the effectiveness of existing countermeasures. It reviews literature on cyber-criminal activities, phishing attacks, and the exploitation of vulnerabilities in operating systems. The report also addresses the research gaps in current malware detection and prevention methods, proposing potential solutions based on pattern matching, application repackaging, and botnet management. Finally, it outlines the future research scope, emphasizing the development of a versatile model applicable across various operating systems and capable of addressing the complexities and limitations of current approaches.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Information Security
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Contents
Abstract:................................................................................................................................................2
Introduction...........................................................................................................................................2
Research Aim........................................................................................................................................1
Research Objective................................................................................................................................1
Research Questions...............................................................................................................................1
Literature Reviews.................................................................................................................................1
Research Gaps.......................................................................................................................................4
Future Research Scope..........................................................................................................................5
Conclusion.............................................................................................................................................6
References.............................................................................................................................................6
Document Page
Title: Malwares Past, Present, and Future
Abstract:
Millions of transactions are carried out in the fraction of seconds in the digital world which
opens a door for cyber-criminal to hack the confidential information of the user. Every
premise on the internet is coping up with the threat of attacks. Malware are the malicious
software which can get associated with the software code of the application software to
disrupt the functioning and modify and manipulate the data. The effective countermeasures
should be prepared for coping with the future malware designed for the future of
technological world. The literature review is performed to analyse the past, present, and
future growth of the malwares which can adversely affects the functioning of the android
applications.
Keywords: Malware, Counter measure. Dynamic software
Introduction
The digital revolution has increased the
threat to the attacks of malware and
viruses. Every premise on the internet is
coping up with the threat of attacks.
Malware are the malicious software which
can get associated with the software code
of the application software to disrupt the
functioning and modify and manipulate the
data. These malicious software are
intentionally get attached by the hacker in
the software to adversely affect the
computer system. The malware attacks
were recently grows with the development
in the field of mobile phones and other
electronic gadgets. The innovation of the
smart phones connects the user with the
global world. With the few clicks, the user
can fulfil their requirement with the
availability of digital market. The
malwares are the biggest threat in the
global market. The inclusion of the third
party in the transaction process can result
into the spreading of the malwares attack
from the global electronic platform. The
literature review is performed to analyse
the past, present, and future growth of the
malwares which can adversely affects the
functioning of the electronic applications.
The attackers take advantage of the
electronic application for the spreading of
the malware in the global market. The
malwares are comprised of various types
of viruses and worms such as Trojan horse,
spyware, ransom ware, and others. These
malicious programs are developed by the
Document Page
cyber-criminals for modifying the
confidential data of the user, stealing the
private information, monitoring of the
computer activities program, and others. It
is the unauthorised accessing of the user
account without their permission [1]. The
innovations in the electronic gadgets are
prone areas of the malware attacks. The
countermeasures should be designed for
developing security system against the
attacks of malwares to protect and secure
the premises of the internet. In this paper,
we will undertake the literature review on
the past, present, and future of the
malwares.
Research Aim
The aim of the research is to analyse the
growth of the malware from past to future
by conducting a literature review. The
gaps of the research should be analysed for
the future direction of the research
proposal. The focus should be given on the
countermeasures to minimize the effects of
the malware of the computer, mobile
premises, and other electronic gadgets.
Research Objective
The objectives of the research are
highlighted below:
ï‚· Analysis of the past, present, and
future growth of the malware
ï‚· Impact of malware on the smart
phone application
ï‚· Relationship between android
operating system and the malwares
ï‚· Countermeasures for preserving the
electronic gadgets with the
malware attacks
ï‚· Impact of malware on the user
Research Questions
ï‚· What are malwares?
ï‚· How the growth in the malware
takes place from past to future?
ï‚· What are the impacts of malware
on the electronic gadgets and the
users?
ï‚· How the growth of the malware
risen up with the innovation in the
digitization?
ï‚· What are the countermeasures
which can reduce the malware
attacks?
Literature Reviews
The literature review is conducted for
analysing the past, present, and future of
the malware. From the research it has been
seen that the cyber-criminal activities are
increased with the innovations in the
digitization because it connects the user
with the global world. Millions of
transactions are carried out in the fraction
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
of seconds which opens a door for cyber-
criminal to hack the confidential
information of the user [2]. The cyber-
criminal activities are carried out through
the initialization of the malware software
code in the android application.
From the research, we come across that
different malwares are developed for
performing different operations. In the
past, simple virus programs are developed
to disrupt the functionality of the computer
system. The activity of virus inclusion
increases the sale of the anti-virus
program. Later on, the activity of piracy
was initiated for copying the data of the
user without the permission of the owner.
With the innovation of the android
operating system, it connects the user with
the GPS system which increases the
chance of hijacking the secret information
of the user such as credit card details, debit
card details, bank account details, PIN
numbers, and others [3]. The leakages of
the confidential information can have
adverse effect on the user. The droid
dream light is the malware which is used
for extracting the information by analysing
the browsing history of the user, fetching
the IMEI number of the digitization,
stealing of the confidential information of
the user, and others. There are a risk of
data leakages of the confidential
information of the user while making
payment transaction in the digital market
by making use of credit card details, bank
accounts, PIN number, and others [4].
The phishing attack is based on generating
emails, false call, and SMS. The false calls
are generated to the customers for getting
their private and confidential information
[5]. The confidential information of the
user can be used for fund transfer. The root
exploitation can be effectively carried out
for modifying the underlying information
through the malware named as Exploid,
Zimperlich, Rageagainstthecage, and
others. These malwares root out in the
software for getting privilege to modify the
information of the application. Search
engine optimization attacks are comprised
of positioning the malware sites on the top
of the search. The clicking on the fraud
websites will result into the inclusion of
malwares in the computer system by
downloading of the malware software into
the electronic gadgets of the user. It has
been researched that the android
application will results into the
downloading of the malicious code in the
premises [6]. The loop holes are created in
the android applications which are the
chance of fraud and hijacking activities to
occur.
The innovation in the field of technologies
increases the scenario of malicious
activities. In the past, the phishing
Document Page
activitees were majorly occurs for
hijacking the confidential details of the
user by making false calls and SMS
activities [7]. From the research, it has
been found that 45% of the organization
have experienced a phishing attack in the
past.
The future plan is to prepare a mitigation
and countermeasure for minimizing the
impact of malware on the premises of the
organization and personal data of the
customers [8]. It is required to analyse the
data storage where the users are going to
store their data, analysing the susceptible
of malware occurrence, developing new
rules and regulations for determining
strategy to preserve the confidential data,
deploying training and development
program for the employees for analysing
the phishing threat associated with the
organization working functional plan,
deploying right security procedures for
deploying security solutions associated
with the cloud email functioning, and
others.
The appropriate countermeasures should
be prepared for minimizing the effect of
malware on the organizational premises.
Droid ranger is the application which is
based on heuristic approach for detecting
the presence of malware. This application
is working on identifying the occurrence of
suspicious activity. The SCanDroid is an
application which is used for analysing the
flow of data within the working structure
of the organization. It is based on the uni-
addressing system for analysing the
policies of the content providers.
ComDroid is the application used for
analysing and detecting the vulnerabilities
associated with the communication
protocols. The inter-processing addressing
system should be used measuring the
occurrence of the vulnerabilities associated
with the android operating system. The
executable files of the processing units are
used for analysing the intent and
component associated with the potential
malwares. The analysis of the control flow
and data flow helps in finding the gaps for
the data leakages during the development
of the structure. The deployment of the
sensitive hardware such as GPS, Sensor,
cameras, and others is helpful for
analysing the potential leakages in the data
flow control structure. The droidscope is
based on emulation technology which is
used for inspecting working of the android
devices based on amalgamation of
hardware, virtual machine, and operating
system. The sequence of logging
behaviour can be analysed by detecting
malware for constructing the variation in
runtime.
Document Page
The innovation in the technological
advancement results in the different
malware attacks. The protection
mechanism should be developed for every
field. The other major field is cloud
computing technology. Most of the
organizations are transforming their
working tactics with the cloud based
environment. The protection mechanism
should be developed for cloud based
environment. The paranoid android is
helpful for running the application on the
virtual environment securely to deploy the
cloud services. The IoT is the next
generation of the technological world. The
hackers will develop new malwares for
retrieving data from the real system. The
IoT devices and communication is facing
problem of security in managing
communication between the participating
units. Hackers can retrieve the information
of the customers from the online database
where the personal information of the user
is stored.
Research Gaps
It has been analysed that the malware are
the serious attacks which should be applied
countermeasure for preserving the quality
standard of the application. The mitigation
policies should be developed for
preserving the privacy of the user and the
organization. There are few gaps in the
countermeasures which are prepared for
malware detection and prevention. The
new proposed model should be capable of
managing and detecting malware attacks
on the multiple applications. There are
some proposed models which are used
defining malware attacks effectively
according to the future innovations in the
malware. Some of the countermeasures are
listed below:
Attacks based on pattern matching: The
information of the user are collected from
the different application for customised the
pattern matching. The statistical control
should be developed for analysing the
machine learning algorithm. The control
policies should be used for analysing the
malicious application. It is capable of
detecting and avoiding malicious code in
the working architecture of the application.
Attacks based on repackaging of
application: The numbers of application
are newly designed for providing quality
service to the customers. The legitimating
application should be used for detecting
the difficulties in the malicious
application. The reverse engineering
procedures are used for defining the source
code for analysing the presence of
malicious code.
The increasing demand of social media
platforms opens door for hacking the
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
information directly from the user account.
It is required to develop security
procedures for managing the botnets
among the communication forum of
customer to customers. The botnets are
used for detecting the data leakages from
the WI-FI access points. The botnet
network helps in analysing the flow of
information and detecting the presence of
malwares in the data packets sends in the
peer to peer networking channels [9].
The execution of the native codes on the
android operating system should be
checked for analysing the presence of the
malwares. The auto-response should be
generated by using the hash value
procedures for determining the presence of
the malware.
Future Research Scope
The future direction of the research is to
develop a model which is capable of
overcoming the complexities and
limitation of the researched
countermeasures. The single solution
should be prepared which is capable of
running on different operating system such
as android, windows, apple, and others for
detecting the presence of malware in the
newly designed application. The effective
solution should be prepared for exploring
the anti-virus capabilities which is capable
enough for managing the presence of
malware in the system application (Amro,
2018). The proactive detection of the
malware helps in preserving the
confidentiality, integrity, accuracy, and
reliability of the application and data. The
newly designed application for mitigating
the presence of malware should make use
of hash value and validation of the
signature process. The native code should
be executed on the android operating
system for determining the presence of the
malware in the source code of the
application or not [10]. The development
of the missed call generator helps in
sending the alert to the user before using
the application. For example, if the user
fetch the audio or a video clip from the
malware site than the automatic missed
call or alert signal will be sent to the user
smart phone and helps in informing the
user not to make use of the malicious files.
This helps in providing security to the user
from the flow of malicious activities in his
smart phone. The new software after
sending the missed call for generating
alerts asks the user to provide permission
of accessing the data from the sharing of
files. The new contacts of the user are
added to the application for sending
signals on the presence of malicious code
in the source program of the application.
The development of dynamic malware
analysis system helps in managing the
malware attacks which can take place on
Document Page
the IoT systems. The next generation of
the technological advancement are the IoT
applications which are developed for
providing real time successful
management of the requirement [11]. The
increasing growth of the IoT environment
will give rise to new malwares. The
detection of the malware through the
dynamic environment helps in initializing
successful implementation of the data flow
in the future working of the enterprise. The
researchers should pay attention to the real
time detector of the malware which can be
based on the hash value integration system
and signature based environment for
managing the malware free resources in
the next generation of the technological
advancement [12]. The dynamic malware
techniques helps in managing advanced
malwares which can be developed in the
coming future by the hackers due to the
growth of intelligent system.
Conclusion
From the research and literature review, it
can be concluded that the malwares are the
major threat from the past, till present, and
continues in the future for disrupting the
flow of information and loss of data. The
proactive preventive measures should be
prepared which can minimise the effect of
malware presence on the system of the
user. The dynamic procedures for malware
detection should be used for predicting the
presence of malware in the source code.
The algorithms should be based no hash
value integration and signature validation
and verification procedures. The inter-
processing addressing system should be
used measuring the occurrence of the
vulnerabilities associated with the android
operating system. The increasing demand
of social media platforms opens door for
hacking the information directly from the
user account. It is required to develop
security procedures for managing the
botnets among the communication forum
of customer to customers. The executable
files of the processing units are used for
analysing the intent and component
associated with the potential malwares.
The analysis of the control flow and data
flow helps in finding the gaps for the data
leakages during the development of the
structure. The development of dynamic
malware analysis system helps in
managing the malware attacks which can
take place on the IoT systems.
References
[1] S. Alam , Current trends and the future
of metamorphic malware detection. 2014.
[2] B. Amro. Malware detection techniques
for mobile devices. 2017.
[3] B. Amro, Personal mobile malware
guard: A mobile malware detection
techniques. 2018.
Document Page
[4] C. Castillo, Android Malware past,
present, and future. 2014.
[5] E. Erturk, A case study in open source
software security and privacy: Android
Adware. 2012.
[6] P. Gerland, Software Development:
Past, Present, and future trends and tools.
2011.
[7] N. Huq, and N. Micro, The latest
research on PoS malware. 2013.
[8] I. Muttik, Security mobile devices:
Present and future. 2011.
[9] R. Raveendranath, R. Venkiteswaran,
A. Babu, and S. Datta, Android malware
attacks and countermeasures: Current and
future direction. 2013.
[10] Security Blogger, Ransomware: Past,
present, and future. 2016.
[11] M. Wagner, F. Fischer, R. Luh, A.
Haberson, A. Rind, A. Keim, and W.
Aigner, A survey of visualization systems
for malware analysis. 2011.
[12] F. Wu, H. Narang, D. Clarke, An
overview of mobile malware and solutions.
2014.
chevron_up_icon
1 out of 10
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]