A comparison, analysis, and provision of methods in identifying types of malware and means of malware detection and protection against them

12/16/2022
by   Sebastian Grochola, et al.
0

In this research paper, our intent is to outline different types of malware, their means of operation, and how they are detected in order to protect yourself against such attacks. Varied permission, and limited technical resources mean that detecting malware and such attacks becomes more difficult. With the normal user being limited to the UI, their ability to see what happens in the background is virtually limited to none. Many do not have control on how they distribute permission over the data the applications they use controls, or how that data is stored or distributed. They also do not receive any notification as to whether their data is protected against various attacks and if it has not been attacked already. In this paper, we present evidence on what malware is, how malware operates, different types of malware, and the general means of defence.

READ FULL TEXT

Please sign up or login with your details

Forgot password? Click here to reset
Success!
Error Icon An error occurred

Sign in with Google

×

Use your Google Account to sign in to DeepAI

×

Consider DeepAI Pro