Various Malware Handling Technique

Authors

  • Feri Sulianta The Department of Informatics Widyatama University Author

Keywords:

Protection, malware, computer program, computer virus

Abstract

All malicious computer programs are classified as malware or malicous software. Malware has a variety of characteristics with a variety of destructive actions, the handling varies from one type to another.
Various categorizations of malware that are commonly known include: computer viruses, worms, trojan horses, spyware, adware, hoaxes, backdoors, scareware, rootkits, etc. And that's not all, various worms, trojans and viruses can be classified into various categories. Apart from the above classification, there is still malware that is categorized as 'unwanted program'.
So you can be sure that computers, internet, data and information in them will always get threats from creatures called malware.

Downloads

Download data is not yet available.

References

Divya, S., A survey on various security threats and classification of malware attacks, vulnerabilities and detection techniques. International Journal of Computer Science & Applications (TIJCSA), 2013. 2(04).

Schmidt, A.-D., et al., Monitoring smartphones for anomaly detection. Mobile Networks and Applications, 2009. 14(1): p. 92-106.DOI: https://doi.org/10.1007/s11036-008-0113-x.

Cohen, F., A cost analysis of typical computer viruses and defenses. Computers & Security, 1991.10(3): p. 239-250.DOI: https://doi.org/10.1016/0167-4048(91)90040-K.

Mercer, C.W. Operating system support for multimedia applications.

Gouda, M.G. and A.X. Liu, Structured firewall design. Computer networks, 2007. 51(4): p. 1106- 1120.DOI: https://doi.org/10.1016/j.comnet.2006.06.015.

Hsu, F.-H., et al., Antivirus software shield against antivirus terminators. IEEE Transactions on Information Forensics and Security, 2012. 7(5): p. 1439-1447.DOI: https://doi.org/10.1109/TIFS.2012.2206028.

Lee, Y. and K.A. Kozar, Investigating factors affecting the adoption of anti-spyware systems. Communications of the ACM, 2005. 48(8): p. 72-77.DOI: https://doi.org/10.1145/1076211.1076243.

Published

2022-01-30

How to Cite

Sulianta, F. (2022). Various Malware Handling Technique. CENTRAL ASIA AND THE CAUCASUS, 23(1), 794-798. https://ca-c.org/CAC/index.php/cac/article/view/108

Plaudit

Similar Articles

11-20 of 168

You may also start an advanced similarity search for this article.