Abstract

With the expeditious improvement of the internet and information technology, malicious codes and attacks pose a critical threat to internet and computer security. These attacks and malicious codes are increased exponentially and caused huge amounts of financial damage. The potential to recognize several malicious code variants and threats is crucial for preservation across unauthorized access to computer data, information, data theft, security breaches, etc. Recent methods for identifying malicious codes and threats have indicated less precision and deficient speeds. This paper aims to conduct a brief and systematic survey on the malware detection methods based on the soft computing model. This work is expected to help researchers to understand the malware detection technology and the direction of its research development.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.