All About Malwares (Malicious Codes)

Malware, short term for malicious software, is a software which is developed to penetrate computers in a network without the user’s permission or notification. Malware is a common term for a variety type of malicious software. In general, Malwares include Worm, Botnet, virus, Trojan horse, Backdoor, Rootkit, Logic bomb, Rabbit and Spyware. Despite many works that have been done in the area of Malware, still there is not any distinct classification which differentiates different kind of Malwares and explains each of them thoroughly. In this paper, we define each of them in detail and emphasize their differences. We also conclude our studies in this area with providing a diagram which gives a comprehensive overview about Malware. Among the diverse forms of malware, botnet and worm are the most widespread and serious threat which occur commonly in today‘s cyber attacks. Therefore, we concentrate more on them and their communication topologies.

[1]  Somesh Jha,et al.  A semantics-based approach to malware detection , 2008, TOPL.

[2]  Iván Arce,et al.  An Analysis of the Slapper Worm , 2003, IEEE Secur. Priv..

[3]  Sven Dietrich,et al.  Analysis of the Storm and Nugache Trojans: P2P Is Here , 2007, login Usenix Mag..

[4]  John F. Shoch,et al.  The “worm” programs—early experience with a distributed computation , 1982, CACM.

[5]  Vinod Yegneswaran,et al.  An Inside Look at Botnets , 2007, Malware Detection.

[6]  Peter J. Denning,et al.  Computers under attack: intruders, worms, and viruses , 1991 .

[7]  方人 计算机病毒(computer virus) , 1994 .

[8]  Felix C. Freiling,et al.  Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks , 2005, ESORICS.

[9]  Brian Rexroad,et al.  Wide-Scale Botnet Detection and Characterization , 2007, HotBots.

[10]  Aaron Hackworth,et al.  Botnets as a Vehicle for Online Crimes , 2006 .

[11]  Farnam Jahanian,et al.  The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets , 2005, SRUTI.

[12]  Vinod Yegneswaran,et al.  BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation , 2007, USENIX Security Symposium.

[13]  Ken Chiang,et al.  A Case Study of the Rustock Rootkit and Spam Bot , 2007, HotBots.

[14]  Neil Daswani,et al.  The Anatomy of Clickbot.A , 2007, HotBots.

[15]  Nicolas Ianelli,et al.  Botnets as a Vehicle for Online Crime , 2007 .

[16]  Shi-Jinn Horng,et al.  A Surveillance Spyware Detection System Based on Data Mining Methods , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[17]  Thomas Johnson,et al.  Computer Security Incident Handling Guide , 2005 .

[18]  Andreas Terzis,et al.  A multifaceted approach to understanding the botnet phenomenon , 2006, IMC '06.

[19]  Eugene H. Spafford,et al.  The Internet Worm Incident , 1989, ESEC.

[20]  Guanhua Yan,et al.  On the effectiveness of structural detection and defense against P2P-based botnets , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[21]  T. Grance,et al.  Computer Security Incident Handling Guide , 2004 .

[22]  Jarkko Oikarinen,et al.  Internet Relay Chat Protocol , 1993, RFC.

[23]  Somesh Jha,et al.  A semantics-based approach to malware detection , 2007, POPL '07.

[24]  Guofei Gu,et al.  BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic , 2008, NDSS.

[25]  Vesselin Bontchev Methodology of computer anti-virus research , 1998 .