CONCLUSION
This survey paper presents a summary of malware detection and analysis techniques and tools. In particular, the different tools available for malware detection, memory forensics, packet inspec- tion, scanners/sandboxes, reverse engineering, hacking, and website analysis have been thrown light. Since most of the current surveys typically concentrate on a specific subset of the model, this paper offers an in-depth study of methods to identify and evaluate malware with a clear un- derstanding of domain-specific analytics.
Do'stlaringiz bilan baham: |