Select Currency
Translate this page

HOW TO DEAL WITH MALWARE THAT AFFECT SOFTWARE OF THE COMPUTER SYSTEM

Format: MS WORD  |  Chapter: 1-5  |  Pages: 57  |  966 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE COMPLETE PROJECT

HOW TO DEAL WITH MALWARE THAT AFFECT SOFTWARE OF THE COMPUTER SYSTEM

 

 

Abstract

Malware continues to be a signification problem facing computer use in today’s world, historically anti-virus software re has employed the use of static signatures to detect instances of known malware signature based detection has fallen out of favor to many, and detection technique based on identifying malicious program behavior are now part of the anti-virus tool kit, however, static approaches to malware detection have been heavily researched and can employ modern finer prints that significially improve on the simple string signatures used in the past, instance based learning can allow the detection of an entire family of malware variants based on a single signature of static features, statistical machine learning can turn the features extracted into a predictive anti-virus system able to detect novel and previously unseen malware samples, this paper surveys the approaches and techniques used in static malware detection.

CHAPTER ONE

INTRODUCTION

1.1 BACKGROUND OF STUDY

Malware is a generic term used to describe all kinds of malicious software (e.g., viruses, worms, or Trojan horses). Malicious software not only poses a major threat to the security and privacy of computer users and their data, but is also responsible for a significant amount of financial loss. Unfortunately, the problem of malicious code is likely to continue to grow in the future, as malware writing is quickly turning into a profitable business.

Malware authors often sell their creations to miscreants, who then use the malicious code to compromise large numbers of machines that are linked together in so-called bonnets. These bonnets are then abused as platforms to launch denial-of-service attacks or as spam relays. Malware programs frequently contain checks that determine whether certain files or directories exist on a machine and only run parts of their code when they do. Others require that a connection to the Internet is established or that a specific mutex object does not exist. In case these conditions are not met, the malware may terminate immediately. This is similar to malicious code that checks for indications of a virtual machine environment, modifying its behavior if such indications are present in order to make its analysis in a virtual environment more difficult. Other functionality that is not invoked on every run are malware routines that are only executed at or until a certain date or time of day. For example, some variants of the Bagel worm included a check that would deactivate the worm completely after a certain date. Another example is the Michelangelo virus, which remains dormant most of the time, delivering its payload only on March 6 (which is Michelangelo’s birthday). Of course, functionality can also be triggered by other conditions, such as the name of the user or the IP address of the local network interface. Finally, some malware listens for certain commands that must be sent over a control channel before an activity is started. For example, bots that automatically log into IRC servers often monitor the channel for a list of key words that trigger certain payload routines. When the behavior of a program is determined from a single run as in current industrial analysis systems, it is possible that many of the previously mentioned actions cannot be observed. This might lead a human analyst to draw incorrect conclusions about the risk of a certain sample.

1.2 STATEMENT OF MALWARE PROBLEM

A network problem from an online advertising provider prompted malicious software warnings across many popular news website, including bangordailynews.com Trojans are increasingly a problem for Mac user in the 1990s hackers enjoyed a virtual wild west of unpatched exploitable software, but as the new decade rolled around companies lice Microsoft corp. (MSFT) as a result it’s become header for malware to install on windows computers without some hackers have circumvented this by creating programs that tick the user into approving the installation via exploiting trust, the approach has become tremendously successful and to day Trojan –type malware are responsible for a large percentage of the window botnet.

1.3 AIM AND OBJECTIVE OF THE STUDY

Some of the malware capabilities that crowd source has the ability

To give detailed perspective into the various system and efficiently handle the malware threat and reduce the impact business for achieving these objective, in response to the emergence of spyware a small industry has sprung up dealing in antispyware software. To detects debugger based reversing To encrypt and decrypts data To provides remote desktop capacity To steal or modifies cookies To mines or steals bit coins To communicate with database  To takes screenshots To access webcam To down and upload files To logs keystrokes To communicate via socks protocol

The main objective of dealing with malware is discuses below

To know the program that detects malware To carryout a full scan of your computer, another principle objective are to exploit whatever possible means to your computer system. To providing a forum for discussions related to testing of anti-malware and related products. Developing and publicizing objective standards and best practices for testing of anti-malware and related product. Promoting education and awareness of issue related to the testing of anti-malware and related product Providing tools and resources to aid standard based testing methodologies

1.4 SCOPE OF THE STUDY

The scope of this research study aimed to develop an anti –virus to the computer system that is infected with malicious virus that causes damages to file, document, and loss of files in the computer system.

1.5 LIMITATION OF THE STUDY

The research study (project) is only restricted on dealing with malware the malicious virus that affect the computer system limit this research project work are as follow:

The factor, time duration for the research project is not enough to carryout proper research work. Financial factor, inadequate finance in searching on the internet for materials is a problem to student Power failure, irregular power supply (electricity) need for the operation of most business centre that uses material on the internet The duration period that the project was kept before approved and registration of the project topic is a factor. Student is not given access to the library to source for material at the right time.

The above factor work against to delay this project

1.6 PURPOSE OF THE STUDY

The purpose of study malware is to know the program behavior and verify if it has malicious functionality or behavior, today malware is use primarily to steel sensitive information of personal, financial or business importance black hat hacker with harmful intentions, malware is sometime used broadly against government or corporate website together guarded information or to disrupt their operation in general however malware is often used against individuals to gain personal information such as society security number , bank, or credit card number and so on, left unguarded personal and networked computer can considerable risk against the threats, these are most frequently counter acted by various type firewall and virus software, network; since the rise of widespread broadband internet access malicious software has more frequently been designed for profit, since 2003 the majority of widespread virus and worms have been designed to take control of users computer for black market exploitation.

1.7 DEFINATION OF TERM USED

Botnet: derived from the word “robot,” and used in a variety of Internet contexts, in the context of this paper, it refers to a program that runs in the background on a personal computer of an unsuspecting user, having been installed by malware. Botnet: a collection of bots that receive instructions from the same “master” program.

Data Host: company that maintains servers on the Internet that process data for customers using a standard technology such as web or email servers Exfiltration method by which malware exports data from an infected host, typically refers to an unauthorized process of acquiring data from a computer system through network channels or unauthorized portable media.

Footprint: With reference to software component is used to indicate the physical characteristics of a file such as its size, the file names as well as the operating system’s resource utilization. These characteristics help to uniquely identify the various software components encountered during the investigative process.

Jabber: a communications protocol used for instant messaging

Kernel: operating system component that serves as a bridge between software applications and system services provided by hardware, and typically designed to facilitate a trusted channel between the OS user and system-level functionality

Malware: malicious software, any and all software that is deployed with malicious intent

Operating System: software that directly manages and controls interaction with hardware devices that combine to compose a computer, provides common services to applications, and makes resources available to users.

Phishing: email-born malware propagation systems.

Root kit: enables privileged access to a system and the ability to hide that access by subverting the provided authentication, authorization, and audit functions

Socks: a protocol that allows multiple network connections to route network traffic through a single network-enable device

Zero-Day: modifier for the word threat or attack, meaning that the vulnerability that is used by the threat agent is not known to potential victims.

  DOWNLOAD THE COMPLETE PROJECT

HOW TO DEAL WITH MALWARE THAT AFFECT SOFTWARE OF THE COMPUTER SYSTEM

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON HOW TO DEAL WITH MALWARE THAT AFFECT SOFTWARE OF THE COMPUTER SYSTEM INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Abdul Mateen Iddrisu
UDS
At first I taught is a site full of fraudsters until I saw my project in my Gmail after my payment.. THANK YOU IPROJECTMASTER and May God the almighty bless u guys abundantly
Excellent
JONNAH EHIS
Ajayi Crowther University, Oyo
I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!
Excellent
Merry From BSU
I am now a graduate because of iprojectmaster.com, God Bless you guys for me.
Excellent
Oluchi From Michael Opara University
If you are a student and you have not used iprojectmaster materials, you are missing big time! iprojectmaster is the BEST
Excellent
Abdulrahman Jibrin
Nti Abaji
Nice one work prompt delivery tanx
Very Good
Azeez Abiodun
Moshood Abiola polytechnic
I actually googled and saw about iproject master, copied the number and contacted them through WhatsApp to ask for the availability of the material and to my luck they have it. So there was a delay with the project due to the covid19 pandemic. I was really scared before making the payment cause I’ve been scammed twice, they attended so well to me and that made me trust the process and made the payment and provided them with proof, I got my material in less than 10minutes
Very Good
Gbadamosi Solomon Oluwabunmi
Lasu
Swift delivery within 9 minutes of payment. Thank you project master
Excellent
Abubakar Iliyasu Hashim
Federal college of education pankshin affiliated to university of jos
I am highly impressed with your unquantifiable efforts for the leaners, more grace to your elbow.I will inform my colleagues about your website.
Very Good
Emmanuel Essential
Kogi state University
I actually took the risk,you know first time stuff But i was suprised i received as requested. I love you guys 🌟 🌟 🌟 🌟
Very Good
Abdulrazak Bello Marsha
Usman Dan fodio University
It was quite a better guide for project and paper presentation purpoting. Many thanks.
Average

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on HOW TO DEAL WITH MALWARE THAT AFFECT SOFTWARE OF THE COMPUTER SYSTEM?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on HOW TO DEAL WITH MALWARE THAT AFFECT SOFTWARE OF THE COMPUTER SYSTEM?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for HOW TO DEAL WITH MALWARE THAT AFFECT SOFTWARE OF THE COMPUTER SYSTEM, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!