Abstract

As IT technology increases, it became part of our life. Because of change in numbers, the files anddata used in IT also increased. With simple data and file, malicious codes also increased in greatnumber. This malicious code leads too many problems in the society. In fact, recently, new maliciouscodes that have not been detected yet are used in attacks such as APT (Advanced PersistentThreat). These codes became problem and lead to great damages. Thus, the speed of finding theundefined malicious code and making countermeasures became one of the important key words ofthe security. However, finding new malicious codes that is currently in action seems impossible. Inorder to find the malicious codes faster, there are researches on finding the special properties of themalicious code’s file or action pattern. Through finding the properties of the codes, detecting themalicious codes became more effective and the results are satisfactory. This research will find therelation of malicious code’s file property, behavior property, and property of each group or groupas a hole in order to effectively detect the code that is suspicious of being malignant effectively andprecisely. Thus, this paper will present a way to apply priority when it comes to detecting maliciouscode.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call