Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches  

Abstract

Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats that can be used in implementing security prevention mechanisms. In order to learn and understand the malwares, behavior-based technique that applied dynamic approach is the possible solution for identification, classification and clustering the malwares.[1] However, it is still unpopular because of its rigid and restrictive nature. In this paper, we study and analyze both approaches and try to determine the best and optimal anti-malware approach.Malware is one of the major security threats in computer and network environment. However, Signature-based approach that commonly used does not provide enough opportunity to learn and understand malware threats that can be used in implementing security prevention mechanisms. In order to learn and understand the malwares, behavior-based technique that applied dynamic approach is the possible solution for identification, classification and clustering the malwares.[1] However, it is still unpopular because of its rigid and restrictive nature. In this paper, we study and analyze both approaches and try to determine the best and optimal anti-malware approach. 

Authors and Affiliations

Ashwini Mujumdar , Gayatri Masiwal, , Dr. B. B. Meshram

Keywords

Related Articles

IDENTIFICATION OF HUMAN THROUGH PALMPRINT: A REVIEW 

Palm Print is one of the relatively new physiological biometrics, attracted the researchers due to its stable and unique characteristics. The rich feature information of palm print offers one of the powerful means...

An Approach for Storage Security in Cloud Computing- A Survey 

The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. In addition to cloud infrastructure and platform provider...

Data Mining: Estimation of Missing Values Using Lagrange Interpolation Technique

In the real world Most of the datasets have missing data. The presence of missing values in a dataset can affect the performance of Mining Algorithms. In this paper we are using Lagrange interpolation method for predicti...

A Survey on Image Noises and Denoise Techniques 

Digital images are noisy due to environmental disturbances. To ensure image quality, image processing of noise reduction is a very important step before analysis or using images. Data sets collected by image sensor...

Study of Imaged Based Human Height Measurement & Application  

— The paper represents practical improvement in Imaged based human height measurement system. The configuration of proposed measurement is very simple, consisting of one static camera and laser circuitry. Camera...

Download PDF file
  • EP ID EP93538
  • DOI -
  • Views 164
  • Downloads 1

How To Cite

Ashwini Mujumdar, Gayatri Masiwal, , Dr. B. B. Meshram (2013). Analysis of Signature-Based and Behavior-Based Anti-Malware Approaches  . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 2(6), 2037-2039. https://europub.co.uk./articles/-A-93538