International Journal of Scientific & Technology Research

Home About Us Scope Editorial Board Blog/Latest News Contact Us
10th percentile
Powered by  Scopus
Scopus coverage:
Nov 2018 to May 2020


IJSTR >> Volume 6 - Issue 6, June 2017 Edition

International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616

New Ways To Fight Malware

[Full Text]



Muni Prashneel Gounder, Mohammed Farik



Malicious Software, Malware, Malware Detection, Ransomware



Network security is vital in each field of today's reality, for example, government workplaces, instructive foundations, any business association and so forth. Information security is now top agenda for any computing environment ensuring safe transmission of information from sender to recipients. Dangers to data privacy are powerful and enhanced devices in the hands of attackers that could utilize the vulnerabilities of a system to degenerate, annihilate steal the sensitive data. This paper discusses latest trends and types of malwares, malware attacks techniques, method of propagation and detection additionally, it exhibits recommendations on various solutions are expressed to combat malware attacks. The primary beneficiaries of this journal are network engineers, network administrators, academics and students whose focus area is network security for research and development.



[1] Sulleyman, A. (2017). If you have an Android, you need to read this. [online] The Independent. Available at: http://www.independent.co.uk/life-style/gadgets-and-tech/news/android-malware-phones-infected-samsung-galalaxy-s7-nexus-5x-models-before-sale-a7626726.html [Accessed 26 Apr. 2017].

[2] Shah, T. (2014). Network Security- Virus Attacks and Defence using Antivirus Software. International Journal of Advanced Research in Computer Science & Technology, [online] 2(4). Available at: http://www.ijarcst.com/doc/vol2-issue4/ver.1/trupati.pdf [Accessed 17 May 2017].

[3] Panda Security Mediacenter. (2017). PandaLabs Q1 Report: Trojans Account for 80% of Malware Infections, Set New Record - Panda Security Mediacenter. [online] Available at: http://www.pandasecurity.com/mediacenter/press-releases/pandalabs-q1-report-trojans-account-for-80-of-malware-infections-set-new-record/ [Accessed 18 May 2017].

[4] Cimpanu, C. (2016). "Surprise" Ransomware Uses TeamViewer to Infect Victims. [Online] http://news.softpedia.com. Available at: http://news.softpedia.com/news/surprise-ransomware-uses-teamviewer-to-infect-victims-502006.shtml [Accessed 2 Apr. 2017].

[5] Ransomware and Businesses 2016. (2016). [online] Symantec. Available at: http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/ISTR2016_Ransomware_and_Businesses.pdf [Accessed 2 Apr. 2017].

[6] Share, D. (2016). Shocking Statistics: 25% of all cyber-attacks in the UK are ransomware | Amazing Support. [online] Amazing Support. Available at: http://www.amazingsupport.co.uk/2016/07/25/25-of-all-cyber-attacks-in-the-uk-are-ransomware/ [Accessed 26 Apr. 2017].

[7] NEWMAN, A. (2016). The Botnet That Broke the Internet Isnít Going Away. [online] Wired.com. Available at: https://www.wired.com/2016/12/botnet-broke-internet-isnt-going-away/ [Accessed 26 Apr. 2017].

[8] Herzberg, B., Zeifman, I. and Bekerman, D. (2016). Breaking Down Mirai: An IoT DDoS Botnet Analysis. [online] Incapsula.com. Available at: https://www.incapsula.com/blog/malware-analysis-mirai-ddos-botnet.html [Accessed 26 Apr. 2017].

[9] Consult, S. (2016). Backdoor in Sony IPELA Engine IP Cameras. [online] Blog.sec-consult.com. Available at: http://blog.sec-consult.com/2016/12/backdoor-in-sony-ipela-engine-ip-cameras.html [Accessed 26 Apr. 2017].

[10] Shah, N., Sharma, A., Farik, M. and Pandey, S. (2016). Cybersecurity Situation in Fiji. TERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, [online] 5(7). Available at: http://www.ijstr.org/final-print/july2016/Cybersecurity-Situation-In-Fiji.pdf [Accessed 26 Apr. 2017].

[11] Deo, S. and Farik, M. (2016). Information Security - Recent Attacks in Fiji. INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH, [online] 5(12). Available at: http://www.ijstr.org/final-print/dec2016/Information-Security-Recent-Attacks-In-Fiji.pdf [Accessed 26 Apr. 2017].

[12] News, 1. (2017). Top 10 Computer Damaging Viruses in The World 2017. [online] Top 101 News. Available at: http://top101news.com/most-popular-top-10-list/2017-2018-2019-2020-2021/computer/computer-damaging-viruses-world-dangerous/ [Accessed 26 Apr. 2017].

[13] Norton_Team (2016). The 8 Most Famous Computer Viruses of All Time. [online] Available at: https://uk.norton.com/norton-blog/2016/02/the_8_most_famousco.html [Accessed 26 Apr. 2017].

[14] Olenick, D. (2017). Mobile malware attacks hit new heights in 2016: Kaspersky Labs. SC Magazine US. [online] Available at: https://www.scmagazine.com/mobile-malware-attacks-hit-new-heights-in-2016-kaspersky-labs/article/641694/ [Accessed 26 Apr. 2017].

[15] Xentaurs. (2017). Report: 2016 saw 8.5 million mobile malware attacks, ransomware and IoT threats on the rise ē Xentaurs. [online] Available at: https://www.xentaurs.com/2017/02/28/report-2016-saw-8-5-million-mobile-malware-attacks-ransomware-and-iot-threats-on-the-rise/ [Accessed 17 May 2017].

[16] Garnaeva, M., Wie, J. and Makrushin, D. (2015). Kaspersky Security Bulletin 2015. Overall statistics for 2015 - Securelist. [online] Securelist.com. Available at: https://securelist.com/analysis/kaspersky-security-bulletin/73038/kaspersky-security-bulletin-2015-overall-statistics-for-2015/ [Accessed 26 Apr. 2017].

[17] Surajudeen, A., Mabayoje, M., Mishra, A. and Oluwafemi, O. (2012). Malware Detection, Supportive Software Agents and Its Classification Schemes. International Journal of Network Security & Its Applications (IJNSA),, [online] 4(6). Available at: https://www.idc-online.com/technical_references/pdfs/data_communications/Malware%20Detection.pdf [Accessed 17 May 2017].

[18] RiskIQ. (2016). 2016 Malvertising Detection & Mitigation Report | RiskIQ. [online] Available at: https://www.riskiq.com/infographic/riskiqs-2016-malvertising-report/ [Accessed 26 Apr. 2017].

[19] En.wikipedia.org. (2015). Logic bomb. [online] Available at: https://en.wikipedia.org/wiki/Logic_bomb [Accessed 26 Apr. 2017].

[20] Zetter, K. (2017). Logic Bomb Set Off South Korea Cyberattack. [online] WIRED. Available at: https://www.wired.com/2013/03/logic-bomb-south-korea-attack/ [Accessed 18 May 2017].

[21] Apvrille, A. (2017). Security Research News in Brief March 2017 Edition. [online] Fortinet Blog. Available at: https://blog.fortinet.com/2017/03/24/security-research-news-in-brief-march-2017-edition [Accessed 26 Apr. 2017].

[22] Lipovsky, R. and Cherepanov, A. (2016). BlackEnergy Trojan strikes again: Attacks Ukrainian electric power industry. [online] WeLiveSecurity. Available at: https://www.welivesecurity.com/2016/01/04/blackenergy-trojan-strikes-again-attacks-ukrainian-electric-power-industry/ [Accessed 26 Apr. 2017].

[23] Whittaker, Z. (2016). Hacker explains how he put "backdoor" in hundreds of Linux Mint downloads | ZDNet. [online] ZDNet. Available at: http://www.zdnet.com/article/hacker-hundreds-were-tricked-into-installing-linux-mint-backdoor/ [Accessed 26 Apr. 2017].