Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches  

Abstract

Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats that can be used in implementing security prevention mechanisms. In order to learn and understand the malwares, behavior-based technique that applied dynamic approach is the possible solution for identification, classification and clustering the malwares.[1] However, it is still unpopular because of its rigid and restrictive nature. In this paper, we study and analyze both approaches and try to determine the best and optimal anti-malware approach.Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats that can be used in implementing security prevention mechanisms. In order to learn and understand the malwares, behavior-based technique that applied dynamic approach is the possible solution for identification, classification and clustering the malwares.[1] However, it is still unpopular because of its rigid and restrictive nature. In this paper, we study and analyze both approaches and try to determine the best and optimal anti-malware approach. 

Authors and Affiliations

Ashwini Mujumdar , Gayatri Masiwal, , Dr. B. B. Meshram

Keywords

Related Articles

Signal Delay Control Based on Different Switching Techniques in Optical Routed Interconnection Signal Delay Control Based on Different Switching Techniques in Optical Routed Interconnection Networks

This paper has investigated the different switching techniques to reduce signal latency for different optical interconnection network architectures that provide sufficient quality of service (QoS) and are suitable fo...

DVS Scheduling in Multi Core Real Time System 

Embedded systems have been widely used in portable devices. To meet real time application demands computing capability of the embedded system should be high. It is very important for designing of embedded system to...

Reconciling the Website Structure to Improve the Web Navigation Efficiency 

The www grows tremendously. It increases the complexity of web applications and web navigation. Recommendations play an important role towards this direction. Our Recommendation is based on user Browsing patterns...

Web Gate Keeper: Detecting Encroachment in Multi-tier Web Application

The Internet services and different applications become vital part of every person’s life. Web services and applications have smoothened the way of users for the faster data access. To meet the user’s requirements for fa...

A New Fragile Approach for Optimization in Invisible Image Watermarking by Using Symmetric Key Algorithms  

In the information technology and communication, the most important factor has been the security of information and one of the methods is watermarking. The Watermarking aims to validate the host and the undeniabl...

Download PDF file
  • EP ID EP93538
  • DOI -
  • Views 163
  • Downloads 1

How To Cite

Ashwini Mujumdar, Gayatri Masiwal, , Dr. B. B. Meshram (2013). Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(6), 2037-2039. https://europub.co.uk./articles/-A-93538