Academic Journals Database
Disseminating quality controlled scientific knowledge

Malware Detection and Removal Techniques

ADD TO MY LIST
 
Author(s): Sudhakar Singh | P.K. Khare | Prashant Mor

Journal: International Journal of Electronics and Computer Science Engineering
ISSN 2277-1956

Volume: 2;
Issue: 1;
Start page: 273;
Date: 2013;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Malware | Intruders | Checksum | Digital Immune System | Behavior blocker

ABSTRACT
Malwares are malignant softwares. It is designed to damage computer systems without the knowledge of the owner using the system. Softwares from reputable vendors also contain malicious code that affects the system or leaks informations to remote servers. Malwares includes computer viruses, Worms, spyware, dishonest ad-ware, rootkits, Trojans, dialers etc. Malware is one of the most serious security threats on the Internet today. In fact, most Internet problems such as spam e-mails and denial of service attacks have malwareas their underlying cause. Computers that are compromised with malware are often networked together to form botnets and many attacks are launched using these malicious, attacker controlled networks. The paper focuses on various Malware detection and removal methods.
Save time & money - Smart Internet Solutions      Why do you need a reservation system?