Integrating Manual Prevention Techniques with Automated Countermeasures for Effectively Averting Malware
Keywords:
Malware, Virus, Worm, Trojan horse, AntivirusAbstract
In today’s world, computer viruses and other forms of malware are among the biggest of the nightmares that haunt information security experts, not to mention a layman. Antivirus programs are the most common, if not the only, relied upon solution available to deal with malware. Different types of antivirus programs offered by multi-billion dollar antivirus industry, signature-based, heuristic-based and hybrid, are still a long way from meeting the expected level of contribution. Significant performance deterioration is also a major downside of antivirus programs. This paper discusses various manual techniques that can be exercised in combination with existing automated countermeasures in order to help in effectively preventing malware with improved performance. The scope of this paper is limited to Microsoft Windows family of operating systems.
Â
References
J. E. Canavan, Fundamentals of Network Security, Library of Congress Cataloging-in-Publication Data, Artech House, Boston London, 2001
John Aycock, Advances in Information Security, Computer Viruses and Malware, Springer, 2006
Vangie Beal. (2010) The Difference between a Computer Virus, Worm and Trojan Horse. [Online]. Available: http://www.webopedia.com /DidYouKnow/internet/2004/virus.asp
(2012) Autorun.inf: Structure and Making. [Online]. Available: http://www.autoruntools.com/autorun-inf.php
Mikko. (2009). When is Autorun.info Really an Autorun.inf?. [Online]. Availble: http://www.f-secure.com/weblog/archives/00001575.html
(2012) Antivirus. [Online]. Available: http://www.scribd.com/doc/47040815/Antivirus
M. T. Qassrawi, “Client Honeypots: Approaches and Challenges, New Trends in Information Science and Service Science (NISS)â€, in IEEE Conference Publications, Gyeongju, China,, PP. 19-25, 2010
L. Ying, Z. Yan, O. Yang-gia, “The Design and Implementation of Host-based Intrusion Detection Systemâ€, in Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI), IEEE Conference Publications, pp. 595-598, April 2010
(2011). Firewalls. [Online]. Available: http://www.vicomsoft.com
/learning-center/firewalls/
Downloads
Published
Issue
Section
License
- Papers must be submitted on the understanding that they have not been published elsewhere (except in the form of an abstract or as part of a published lecture, review, or thesis) and are not currently under consideration by another journal published by any other publisher.
- It is also the authors responsibility to ensure that the articles emanating from a particular source are submitted with the necessary approval.
- The authors warrant that the paper is original and that he/she is the author of the paper, except for material that is clearly identified as to its original source, with permission notices from the copyright owners where required.
- The authors ensure that all the references carefully and they are accurate in the text as well as in the list of references (and vice versa).
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Attribution-NonCommercial 4.0 International that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.