Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches  

Abstract

Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats that can be used in implementing security prevention mechanisms. In order to learn and understand the malwares, behavior-based technique that applied dynamic approach is the possible solution for identification, classification and clustering the malwares.[1] However, it is still unpopular because of its rigid and restrictive nature. In this paper, we study and analyze both approaches and try to determine the best and optimal anti-malware approach.Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats that can be used in implementing security prevention mechanisms. In order to learn and understand the malwares, behavior-based technique that applied dynamic approach is the possible solution for identification, classification and clustering the malwares.[1] However, it is still unpopular because of its rigid and restrictive nature. In this paper, we study and analyze both approaches and try to determine the best and optimal anti-malware approach. 

Authors and Affiliations

Ashwini Mujumdar , Gayatri Masiwal, , Dr. B. B. Meshram

Keywords

Related Articles

Scaling of Dimensions & Gate Capacitances of MOSFET 

The scaling of complementary metal oxide semiconductor (CMOS) transistors has led to the silicon dioxide layer used as a gate dielectric becoming so thin (1.4 nm) that its leakage current is too large. It is necess...

An Initial Approach to Provide Security in Cloud Network  

Cloud computing is a flexible, cost-effective and proven delivery platform for providing business or consumer IT services over the Internet. Cloud resources can be rapidly deployed and easily scaled, with all pro...

“Integrating Heterogeneous Data Sources Using XML” 

Nowadays organizations not only are increasing the data volume, but also they have to work with a large variety of data sources with different types of data. The central problem of information sources integration r...

Packet Load Generator for Telecom Networks

In this is an era of drastic evolution Telecommunications, packet data communication has gained paramount attention due to increased internet multimedia usage. One of the challenges faced by telecom companies is to provi...

Link Stability and Energy Optimization by Excluding Self node for Mobile and Wireless Networks 

MOBILE ad hoc networks (MANETs) have more popularity among mobile network devices and wireless communication technologies. A MANET is multihop mobile wireless network that have neither a fixed infrastructure nor a...

Download PDF file
  • EP ID EP93538
  • DOI -
  • Views 142
  • Downloads 1

How To Cite

Ashwini Mujumdar, Gayatri Masiwal, , Dr. B. B. Meshram (2013). Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(6), 2037-2039. https://europub.co.uk./articles/-A-93538