Tedext

Detecting and Managing Malware

Detecting and Managing Malware
Detecting and Managing Malware

Types of Malware and Unauthorized Devices

Malware as a term is used in defining the malicious techniques and programs that may not necessarily be viruses but still have the potential to pose threats to one’s system. At times, malware is used to refer to viruses. In viruses, malware refers to four distinct types, File viruses, script viruses, boot viruses and macro viruses. Second on the list are the worms. Worms as independent programs attach themselves to a network. In comparison to a virus which only works if a copy of viruses is shared and opened, worm's sends copies of itself to the network. Worms may often function alongside other programs such as the backdoor programs.

[blur] Trojan is the third form of malware, and it functions by copying itself infecting files which are in the executable form. Trojan are used to logging and transmit keystrokes, delete files or format a disk. However, other types of the Trojans may install special features such as the backdoor. [/blur]

[blur] Adware is the third category of the malware, and it's a dedicated software for displaying adverts. Adware works to display pop-ups through the installation of a specific homepage and executing interface windows. [/blur]

[blur] Spyware also lies in this list. As a program, it is used to collect sensitive information without the concept of a user. Spyware succeeds by reviewing installed apps and history of the previously visited sites. Other forms of malware are riskware which may be used to execute internet requests without the consent of an individual, hoaxes or deliberate misinformation, scams or deceptive apps and dangerous applications that may be used for keylogging, capturing screenshots or password cracking (Subrahmanian et al, 2015). [/blur]


The Approaches Used By Intrusion Detection and Prevention to Identify Malware.

[blur] By definition, intrusion detection or IDS refers to software or hardware which are set to identify specific intrusion signatures that are known for purposes of analysis of inbound and outbound network traffic. In doing this, IDS relies on four main practices, comparison of the intrusion signatures, scanning to detect harmful patterns, monitoring behavior which may be of malicious intent and monitoring of the configuration and settings of systems. [/blur]

[blur] By identifying the virus, IDS quarantines the malware while notifying the personnel. Notwithstanding its ability to identify attacks and analysis the components of the network, IDS is often blamed for two reasons. First, it’s hard for it to detect incoming assaults as it only analyses the ongoing attacks and secondly, it only relies on existing signatures, and thus the newly formed intrusions may still have a way in and still go undetected (Imperva, 2017). To complement IDS, Intrusion prevention system (IPS) is also installed to inspect the incoming traffic hence finding the attacks. IPS are set to rely on application firewalls and filtering of the incoming traffic to secure applications (Imperva, 2017). [/blur]

Apply Malware Detection Tools

Several institutions have come up with malware detection tools to weed out most of the malware. Most of these have been customized depending on what a user intends to address. [blur] A good example of such would be the Spybot, which scans bots, scans malware, hosts modification of files, replaces adware module with inert code to allow the programs to functions. There are other tools such as Super Antispyware, Combo Fix, HijackThis and others such as Malwarebytes' Anti-Malware [/blur]
Methods Used by Anti-Malware Applications to Identify and Mitigate New Malware Outbreaks.

Just as the IDS and IPS work, antimalware undertakes its job by relying on concepts such as the heuristics which employs identification of previously detected malware behavior and characteristics. [blur] Secondly, the malware detects signatures of previously discovered malware hence flagging it as a malware and lastly sandboxing or running a program it suspects to be a virus in a protected space. If the program demonstrates the behavior of malware it is terminated (Polyakov & Bikkula, 2014) [/blur] .

References

Imperva. (2017). Intrusion Detection and Intrusion Prevention Retrieved from https://www.incapsula.com/web-application-security/intrusion-detection-prevention.html

Polyakov, A. A., & Bikkula, R. (2014). U.S. Patent No. 8,719,935. Washington, DC: U.S. Patent and Trademark Office.

Subrahmanian, V. S., Ovelgönne, M., Dumitras, T., & Prakash, B. A. (2015). Types of Malware and Malware Distribution Strategies. In The Global Cyber-Vulnerability Report (pp. 33-46). Springer International Publishing.

Detecting and Managing Malware

  • Order

  • Payment

  • Processing

  • Delivery

Validation error occured. Please enter the fields and submit it again.
Thank You ! Your email has been delivered.