Abstract: With the development and spread of information technologies in recent years, malware has started to manifest itself as a widespread threat that can affect large networks rather than being confined to small attacks. 1 2 3 4 5 As long as the Internet and its connected devices are used, there is the possibility of encountering malicious software every day. And while end-user awareness is increasing in the fight against malware, it is not sufficient to stop malware production and attackers who use malicious software because of vulnerabilities found in systems, errors in the software used and connected networks, and subsequent security vulnerabilities. 6, 7 Malware is a widespread threat and it increases in volume every day. It's essential to understand how it works and how it is evolving. Examining malware and determining how it functions and what its capabilities are is a complex task, made harder by the attackers’ use of anti-forensic features. Dr Ilker Kara of Hacettepe University, Turkey, offers an overview of malware types and forms of attack, and proposes a novel approach to malware analysis, explaining how it works through an example using a real malware attack.
Publication Year: 2019
Publication Date: 2019-01-01
Language: en
Type: article
Indexed In: ['crossref']
Access and Citation
Cited By Count: 23
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot