Integrating Manual Prevention Techniques with Automated Countermeasures for Effectively Averting Malware

Authors

  • Muhammad Tariq Head of Section for Networking/Internet & E-Security Department of IT, Nizwa College of Technology, Nizwa,

Keywords:

Malware, Virus, Worm, Trojan horse, Antivirus

Abstract

In today’s world, computer viruses and other forms of malware are among the biggest of the nightmares that haunt information security experts, not to mention a layman. Antivirus programs are the most common, if not the only, relied upon solution available to deal with malware. Different types of antivirus programs offered by multi-billion dollar antivirus industry, signature-based, heuristic-based and hybrid, are still a long way from meeting the expected level of contribution. Significant performance deterioration is also a major downside of antivirus programs. This paper discusses various manual techniques that can be exercised in combination with existing automated countermeasures in order to help in effectively preventing malware with improved performance. The scope of this paper is limited to Microsoft Windows family of operating systems.

 

References

J. E. Canavan, Fundamentals of Network Security, Library of Congress Cataloging-in-Publication Data, Artech House, Boston London, 2001

John Aycock, Advances in Information Security, Computer Viruses and Malware, Springer, 2006

Vangie Beal. (2010) The Difference between a Computer Virus, Worm and Trojan Horse. [Online]. Available: http://www.webopedia.com /DidYouKnow/internet/2004/virus.asp

(2012) Autorun.inf: Structure and Making. [Online]. Available: http://www.autoruntools.com/autorun-inf.php

Mikko. (2009). When is Autorun.info Really an Autorun.inf?. [Online]. Availble: http://www.f-secure.com/weblog/archives/00001575.html

(2012) Antivirus. [Online]. Available: http://www.scribd.com/doc/47040815/Antivirus

M. T. Qassrawi, “Client Honeypots: Approaches and Challenges, New Trends in Information Science and Service Science (NISS)â€, in IEEE Conference Publications, Gyeongju, China,, PP. 19-25, 2010

L. Ying, Z. Yan, O. Yang-gia, “The Design and Implementation of Host-based Intrusion Detection Systemâ€, in Third International Symposium on Intelligent Information Technology and Security Informatics (IITSI), IEEE Conference Publications, pp. 595-598, April 2010

(2011). Firewalls. [Online]. Available: http://www.vicomsoft.com

/learning-center/firewalls/

Downloads

Published

2016-06-15

Issue

Section

Articles

How to Cite

Integrating Manual Prevention Techniques with Automated Countermeasures for Effectively Averting Malware. (2016). Asian Journal of Computer and Information Systems, 4(3). https://ajouronline.com/index.php/AJCIS/article/view/3889