A Review of the Effectiveness of Malware Signature Databases against Metamorphic Malwares
Abstract
Known obfuscation techniques and other methods discovered by other researches such as Desai and Stamp (2010), Mohan & Hamlem(2012) have made detection of malware more difficult. This research is positioned to reviewing the current practices in the antivirus industry and determining if malware signature databases are adequate in detecting metamorphic malwares.
To list your conference here. Please contact the administrator of this platform.
Paper submission email: CTI@iiste.org
ISSN (Paper)2224-5774 ISSN (Online)2225-0492
Please add our address "contact@iiste.org" into your email contact list.
This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.
Copyright © www.iiste.org