• Login
    View Item 
    •   DSpace Home
    • SUNY Brockport
    • Events/Conferences
    • 2015 SUNY Undergraduate Research Conference
    • View Item
    •   DSpace Home
    • SUNY Brockport
    • Events/Conferences
    • 2015 SUNY Undergraduate Research Conference
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDepartmentThis CollectionBy Issue DateAuthorsTitlesSubjectsDepartment

    My Account

    LoginRegister

    Statistics

    Most Popular ItemsStatistics by CountryMost Popular Authors

    Malware Analysis: A Different Approach

    Thumbnail
    View/Open
    surc/2015/schedule/251/fulltext (1).pdf (36.71Kb)
    Date
    2015-04-10
    Author
    Stachowski, Thomas K.
    Metadata
    Show full item record
    Subject
    Malware
    Virus
    Security
    Computer
    Antivirus
    Worm
    Stuxnet
    Firewall
    Trojan
    Abstract
    Malware is defined as any code that intentionally disrupts normal computer operation. The best-known types are the virus, Trojan horse and worm, however there are many more different types. While most are mere annoyances, they potentially have dire financial, legal and even national security implications. The malware problem goes back early, with simple “rabbit” programs appearing as early as the 1960's, becoming an epidemic in the 1980's then turning into something with industries and even militaries interested. Strangely, very little has changed in the field of detection since the first antivirus programs came into existence, with nearly all relying on signatures of each individual malware. Given the millions of malware in existence, this leads to many problems, including software bloat and even greater vulnerability to security threats. A new approach that observes the behavior of files on the system and monitors the system itself for any unauthorized changes may prove to be a better, more efficient method of detecting malware. The research presentation will include the history of malware from the major firsts to the major threats of today as well as the motives of the creators. In addition, detection methods will be discussed, current methods will be criticized and a new method will be proposed. The presentation will also consist of a demonstration of a different method for detection based on system monitoring and the behavior of programs running on the system. A program will be developed for the demonstration that monitors changes to the state of the system and detects any potentially dangerous changes to files on the system.
    URI
    http://hdl.handle.net/1951/72693
    Collections
    • 2015 SUNY Undergraduate Research Conference [409]

    SUNY Digital Repository Support
    DSpace software copyright © 2002-2022  DuraSpace
    Contact Us | Send Feedback
    DSpace Express is a service operated by 
    Atmire NV
     

     


    SUNY Digital Repository Support
    DSpace software copyright © 2002-2022  DuraSpace
    Contact Us | Send Feedback
    DSpace Express is a service operated by 
    Atmire NV