This paper is published in Volume-5, Issue-3, 2019
Area
Computer Science and Engineering
Author
Adit Kumar Chakravarty, Aditya Raj, Subham Paul, Apoorva S.
Org/Univ
S. J. C. Institute of Technology, Chikkaballapur, Karnataka, India
Keywords
Signature-based approach, Behaviorbased approach, Anomaly, Specification-based
Citations
IEEE
Adit Kumar Chakravarty, Aditya Raj, Subham Paul, Apoorva S.. A study of signature-based and behaviour-based malware detection approaches, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Adit Kumar Chakravarty, Aditya Raj, Subham Paul, Apoorva S. (2019). A study of signature-based and behaviour-based malware detection approaches. International Journal of Advance Research, Ideas and Innovations in Technology, 5(3) www.IJARIIT.com.
MLA
Adit Kumar Chakravarty, Aditya Raj, Subham Paul, Apoorva S.. "A study of signature-based and behaviour-based malware detection approaches." International Journal of Advance Research, Ideas and Innovations in Technology 5.3 (2019). www.IJARIIT.com.
Adit Kumar Chakravarty, Aditya Raj, Subham Paul, Apoorva S.. A study of signature-based and behaviour-based malware detection approaches, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Adit Kumar Chakravarty, Aditya Raj, Subham Paul, Apoorva S. (2019). A study of signature-based and behaviour-based malware detection approaches. International Journal of Advance Research, Ideas and Innovations in Technology, 5(3) www.IJARIIT.com.
MLA
Adit Kumar Chakravarty, Aditya Raj, Subham Paul, Apoorva S.. "A study of signature-based and behaviour-based malware detection approaches." International Journal of Advance Research, Ideas and Innovations in Technology 5.3 (2019). www.IJARIIT.com.
Abstract
In the present scenario, one of the biggest threats to computers and mobile devices is malware. There are two approaches to detect and prevent malware infections: Signaturebased and Behavior-based approach. The Signature-based approach is more widely used, but this outlook can only be used to detect existing and old malwares and it does not allow understanding future threats and militating against these threats. The Behaviorbased approach uses a dynamic analysis method to understand and classify malwares. However, it is still not as favored as its counterpart due to its limiting behavior. In this paper, we study both Signature-based and Behavior-based approaches to determine which the favorable approach to malware detection is.