Malware Analysis Types & Techniques : A Survey
Priya Arora,Rashmi Gupta,Nidhi Malik,Anil Kumar
TLDR
This paper delves into the fundamental concepts of malware analysis, encompassing static and dynamic and hybrid approaches, and explores various detection techniques like signature-based detection, heuristic analysis, behavioral analysis, behavioral analysis, and machine learning techniques.
Abstract
Malware is like a digital troublemaker. It's a type of software that sneaks into computers and gadgets with harmful objectives. It can cause problems by stealing in- formation, damaging files, or making devices act strangely without the owner knowing. Just like a virus can make a person sick, malware can make a computer sick and harm its proper functioning. Malware analysis plays an essential role in cybersecurity by enabling the understanding, detection, and mitigation of malicious software threats. Through careful examination of malware's behavior, code, and techniques, analysts un- cover vulnerabilities, identify attack vectors, and develop effective countermeasures. This process enhances the ability to safeguard digital ecosystems, boost networks, and protect sensitive data, thereby preventing cyberattacks and preserving the integrity of both individual systems and broader technological infrastructures. This research paper primarily centers on the topic of malware, exploring its various forms. It delves into two generations of malware: the first generation, which includes viruses, worms, and spyware, among others; and the second generation, encompassing encrypted, oligomorphic, polymorphic, and metamorphic malware. By examining these different categories, researchers will be able to achieve a deeper intelligence of the evolving landscape of malicious software and its potential impacts. This paper also delves into the fundamental concepts of malware analysis, encompassing static and dynamic and hybrid approaches. It explores various detection techniques like signature-based detection, heuristic analysis, behavioral analysis, and machine learning techniques. By explaining each technique's strengths and limitations, this paper aids researchers, practitioners, and cybersecurity professionals in selecting suitable approaches based on the malware's characteristics and the analysis objectives.
