The topic I chose for this paper is "Malware Detection and Analysis"You are asked to pick and research one ofthe following listed topics below are generic security topicsyou need to do a literature...

1 answer below »


The topic I chose for this paper is "
Malware Detection and Analysis"



You are asked to pick and research one of
the following listed topics below are generic security topics
you need to do a literature review for the subject that you pick and do further
research and see what are some issues, challenges enhancements and new ideas
that you can draw from your research what do you think is best? What you really
want to get to is the part about recommendations and conclusions. You are doing
research to come up with your suggestions and recommendation. Remember to do
your research and think about what you find. Your conclusions should be based
on a careful look at the evidence. You should cite your sources in any way.










Submissions
requirements:









·





Between 6
and 8 Pages not to exceed 8 pages exclude reference page









·





No cover
page please









·





Single
spaced 12 font









·





Any
Citation formats you choose










Grading Rubric


















































































































































Possible Points







Earned Points







Feedback







Organization, Format and Grammar







10













Use section headers, page numbers,

single spaced, proper grammar, topic sentences for each paragraph, build out

each paragraph with details that support each topic sentence, etc. TIP: Find another paper that conducts a literature

review and model after this paper.







Introduction







10













Introduction has two purposes: 1)

get the reader’s attention and 2) introduce what you will cover in the

paper. Be creative! You will lose points if you do not address

both pieces. Creativity is rewarded!







Literature Review







35













Be creative in how you present your

literature review (Figure, diagram, table, etc..).







Recommendations







15













3 recommendations which flow from

your review of topic’s literature. Be

sure the recommendations are based upon your analysis. Recommendations must

be actionable.







Conclusions







10













Specific conclusions you draw from

your paper. What does all this mean?







References







20













1 point for each reference up to 20

references.




Answered 5 days AfterNov 06, 2022

Answer To: The topic I chose for this paper is "Malware Detection and Analysis"You are asked to pick and...

Amar Kumar answered on Nov 11 2022
55 Votes
Malware Detection and Analysis
Introduction
Frequently, the objective of malware analysis is to collect the data required to respond to a system outage. Our usual objectives will be to figure out exactly what took place and ensure that we have located every piece of contaminated equipment and document.When we look into suspected malware, our goal is frequently to figure out exactly what it can do, how to find it on our system, and how to get rid of it or limit the damage it d
oes.When we determine which data require additional investigation, this is an excellent opportunity to establish markers that can be used to detect malware on our system.Malware analysis could be used to create markings that are organized and have a foundation.Have-based markers, or pointers, are used to distinguish dangerous code on compromised computers.The virus's files and specific registry modifications are frequently identified by these markers.In contrast to antivirus marks, malware pointers focus on what the malware does to a framework rather than its individual characteristics, which makes them more effective at identifying malware that changes shape.Arrange marks are used to monitor system activities to identify malicious code.Despite the fact that arrange marks can be created without malware analysis, they typically have a higher identification rate and fewer false positives.
After obtaining the marks, the final objective is to comprehend the infection's workings in detail.This is the question that senior management typically asks the most because they want an in-depth explanation of a significant disruption.The top-to-bottom methods will allow you to ascertain the malware's function and capabilities.Systems for analyzing malware When investigating malware, we frequently only have the malware's unintelligible executable.To specifically comprehend it, we will make use of a variety of modules and traps, each of which only requires a small amount of data.We will need to use a variety of modules to see the whole picture.
Malware analysis can be approached in two main ways: static analysis and dynamic analysis.
Without actually running the malware, static analysis examines it.Dynamic analysis includes running the malware.Additionally, both systems are categorized as essential or advanced.Static analysis involves examining the completed document without taking into consideration the actual rules.You can use static analysis to figure out if a document is harmful, how useful it is, and how to make simple system marks with the information it provides.Static analysis is quick and clear, but it is usually useless against sophisticated malware and tends to overlook important practices.
In order to stop the contamination, provide effective results, or both, dynamic analysis techniques involve executing the malware and monitoring its behavior on the system.Before you can run malware safely, we need to create a condition that will allow us to concentrate the running malware without putting our system or framework at risk.When examining malware, you can frequently move your investigation along more quickly by making educated assumptions about what the malware is trying to do.It goes without saying that if you are aware of how malware typically behaves, you can improve your security.
Literature reviews
Despite significant advancements in cyber security systems and their ongoing expansion, malware remains one of the most potent threats in the cyber environment. Methods from a variety of disciplines, such as network analysis and program analysis, are used in malware analysis to look at dangerous samples and learn more about their behavior and how it changes over time.In the never-ending battle between malware developers and researchers, each new development in security technology typically results in a similar evasion. Some of the effectiveness of novel defensive measures is determined by their features. Obfuscation or other more advanced methods like polymorphism or metamorphism, for instance, can easily circumvent a detection rule based on the MD5 hash of a known virus.
Malware Types
Most malware comes into the following categories:
⦁Backdoor malware is malicious software that sneaks onto a computer to provide the intruder with indirect access, allowing them to virtually operate commands and interact with it without being noticed.
⦁Although each computer infected by the same botnet receives the same instructions from a single command and control server, the botnet provides the attacker with secondary access to the system.
⦁The Data Theft Malware steals data from a victim's computer and sends it to the intrusive program.Watchword and sniffer malware, keyloggers, and hash grabbers are all examples.This virus frequently uses web-based or email to access...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here