Article Review: Analysis of Malware Detection Techniques

Verified

Added on  2022/08/24

|5
|648
|189
Report
AI Summary
Document Page
Running head: ARTICLE REVIEW
Article Review
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ARTICLE REVIEW
Table of Contents
Introduction................................................................................................................................2
Brief report of Article 1..........................................................................................................2
Brief report of Article 2..........................................................................................................3
References..................................................................................................................................4
Document Page
2ARTICLE REVIEW
Introduction
The rate of Malware Attacks has increased at an exponential rate in the latest times.
The more the attacks are being tried to be mitigated, the more the cyber criminals are creating
much enhanced malicious software to gain access of the personal information in an
unauthorized way. It is a known fact that the malware attacks are mostly done to perform
theft of personal data and information for gathering monetary gains. The malware attacks are
not just only damaging the devices of the victims but are also halting financial transactions
and also are capable of cyber lockdowns over an area or an entire city. However, there has
been developed mitigations strategies as well, that simply detects and prevents the malware
attacks to occur. However, there are evidences about the existences of some fractions of
malware infected machines even after the detection and mitigation systems that are used for
developing undetectable betraying and etymological automated URLs for continuing the
works of a malware. There have been several researches conducted on the mitigation factors
of these URLs and following would be about a briefing of two of these researches by two
different authors.
Brief report of Article 1
According to the author (), this report aims at finding the solution to detect the
malicious websites, which are potential malware threats with suspicious URLs. According to
the author, this research topic is extremely necessary for having a precaution before a
malicious URL is clicked by a user unknowingly. If there was a system to detect these, then
the problem regarding the attacks could be much easier to control. The learning of a
mechanism is thus necessary to understand how these URLs need to be detected and how a
user can easily understand if any URL is suspicious enough before clicking onto them. There
have been several approaches developed for this reason which are able to support the
Document Page
3ARTICLE REVIEW
classification of problem by judging the website reputation. They would be detecting the
suspicion from lexical features, IP address properties, WHOIS properties, Domain name
properties and geographic properties. The developed features would then be having
classification models to chalk out the suspicious ones.
Brief report of Article 2
The author of this paper has the opinion on the blacklisted websites, that would have a
defending mechanism against these website URLs with the help of blackhole lists. This is
why, they would be able to reputation-based websites that would effectively list the potential
reputation based blacklist and them study the network. This mechanism would find out if
these blocks are unsolicited or if there is a potential threat that has false positives or false
negatives. Based on these mechanisms, the derivation of suspicious URLs would be classified
so that there would not be a malicious attack on users through potentially harmful websites.
Otherwise, the malware attacks would not be occurring through spam mails, but just by
clicking onto some undetected websites.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ARTICLE REVIEW
References
Ma, Justin & Saul, Lawrence & Savage, Stefan & Voelker, Geoffrey. (2009). Beyond
blacklists: learning to detect malicious Web sites from suspicious URLs. 1245-1254.
10.1145/1557019.1557153.
S. Sinha, M. Bailey and F. Jahanian, "Shades of grey: On the effectiveness of reputation-
based “blacklists”," 2008 3rd International Conference on Malicious and Unwanted
Software (MALWARE), Fairfax, VI, 2008, pp. 57-64.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]