A Review of the Effectiveness of Malware Signature Databases against Metamorphic Malwares

Adesegun Oreoluwa A

Abstract


Known obfuscation techniques and other methods discovered by other researches such as Desai and Stamp (2010), Mohan & Hamlem(2012) have made detection of malware more difficult. This research is positioned to reviewing the current practices in the antivirus industry and determining if malware signature databases are adequate in detecting metamorphic malwares.


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: CTI@iiste.org

ISSN (Paper)2224-5774 ISSN (Online)2225-0492

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org