Abstract
Malware attacks are creating huge inconveniences for organizations and security experts. Due to insecure web applications, small businesses and personal systems are the most vulnerable targets of malware attacks. In the wake of this burgeoning cyber security breach, this article propositions a framework for a complete malware analysis process including dynamic analysis, static analysis, and reverse engineering process. Further, the article provides an approach of malicious code identification, mitigation, and management through a hybrid process of malware analysis, priority-based vulnerability mitigation process and various source code management approaches. The framework delivers a combined package of identification, mitigation and management that simplifies the process of malicious code handling. The proposed framework also gives a solution for reused codes in software industry. Successful implementation of the framework will make the code more robust in the face of unexpected behavior and deliver a revolutionary stage wise process for malicious code handling in software industry.
Highlights
The present cyberspace is imploding with attacks and breaches
Authors of this study provide some data in order to validate their results and framework workflow
If we look at this framework deeply, it is a full bundle supply of ready to use codes
Summary
The present cyberspace is imploding with attacks and breaches. Easy access to internet and quality less security mechanism has created much unusual and dangerous vulnerability in the current digital world. Malware is the software that has some malicious or harmful set of operation or instructions in their source code for performing a malicious activity in a system or network [2]. The growing and expansive rate of software industry creates the need to reuse codes for coders with some improvements instead of writing a new one. The authors characterize the system for extricating secure great codes with malware examination and besides this portray the need and criticalness of the structure. After this clarification, in the last segment, the authors posit the conclusion and enunciate efforts directed towards future work
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.