Research

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

..

is evolving better individuals among multiple species affecting each


other. When one species evolves, the relationship of this species with
other species also changes. Species affect each other in order to evolve
better through each generation. When this philosophy is applied to
computer science, coevolution is used against problems that are aiming to
improve multiple systems simultaneously. These problems can be
cooperative or competitive; however, most problems in the security field
are competitive problems known as the arms race. There are limited
resources in competitive problems and species compete with each other in
order to use more resources. In a competitive problem, while the fitness
value of one species increases, the fitness value of its rivals decreases, or
vice versa. In the experiment for this study, malicious software competes
with anti-malware. While malware tries to survive against anti-malware
software through evasion, the anti-malware software aims to detect both
known and new kinds or variants of malware. The conceptual scheme of
mobile malware/anti-malware co- evolution is illustrated in Figure 4. The
coevolution framework is based on malware and anti-malware evolutions
as previously described in Sections III and IV. Two subpopulations were
used in this model; with the first consisting of malware and the other of
anti-malware. The representations of malware and anti-malware are used
as in the malware and anti-malware evolutions, respectively. There is a
variance on how fitness values are calculated. Two fitness functions were
used; one for malware evolution and the other for anti-malware evolu-
tion. However, in this experiment the fitness function is not evaluated on a
static dataset. The population of each system is used as an input for
evaluating the fitness value of the other system. Hence, coevolution is
carried out on dynamic datasets in each ...
Co Evolution of Mobile Malware and Anti-Malware
1. Magallanes
2. Cruza
3. Cabungcal
Introduction.
Mobile devices have become an integral part of daily life. They provide many useful functions
such as the ability to read and write e-mail, surf the internet, indicate nearby facilities, video
conferencing, and voice recognition, to name but a few. However, the popularity and adaptation
of mobile devices also attract malware writers to develop mobile malware in order to harm
these devices. In order to protect mobile devices from such threats, researchers and security
companies work to develop effective and efficient anti-malware system. There are some
techniques available for malware analysis and detection with varying strengths and weaknesses.
Two common types of malware detection techniques, according to how the code is analyzed,
are static and dynamic analysis. They can also be combined to hybrid solutions. Since dynamic
analysis might not be affordable on some mobile devices due to their significant limitations in
terms of power consumption, most of the proposed approaches in the literature rely on static
analysis, however these tools are known to be vulnerable to some obfuscation techniques and
attacks.

Applied Technology on the Research.


Antimalware is a type of software program created to protect information technology (IT)
systems and individual computers from malicious software, or malware. Antimalware
programs scan a computer system to prevent, detect and remove malware.
Antimalware software uses three strategies to protect systems from malicious
software: signature-based detection, behavior-based detection and sandboxing.
Behavior Monitoring is a technique anti malware uses to identify malware based on its
character and behavior. An anti-malware program doesn't compare the file to any known threats
anymore. If a file exhibits suspicious behaviors, antimalware will view it as a threat.
Why do you need anti malware?
In brief, anti-malware was created to combat all types of malware, not just computer viruses. In
contrast to simple antivirus tools, anti-malware doesn't simply scan email attachments or notify
you of potentially harmful websites. Contemporary anti-malware solutions protect by
monitoring data transferred via networks.
III. Structural Framework
IV. Advantages and Disadvantages
The main advantage of having an antivirus app on your phone is that you're protected from
threats. You'll be protected even at times when you don't know that you need protection. But
one of the disadvantages of having an antivirus app is that your system may become slower.

ADVANTAGES
 Protection from different kinds of malware
 Protection from spyware
 Real time protection
 Firewall included
 Ad blocker included
 Protection from online threats
 Protection from spam
 A worthwhile investment

DISADVANTAGES
 Slows down your system
 Regular updates needed
 Gated protection
 Complicated customer support
 No absolute protection
 Lots of ads
V. Conclusion
Mobile malware is one of today’s biggest security issues. Malware writers have become more
attracted to mobile devices in recent years since these devices have become a widespread,
integral part of daily life. Security firms also release solutions for mobile devices. Since mobile
devices have certain power limitations, most proposed anti-malware solutions in the market rely
on static analysis techniques. However, these techniques could be more open to new attacks or
even new variants of known attacks than dynamic analysis techniques. Therefore, these
techniques need to be evaluated against unseen attacks, which is one of the aims of this current
study. New mobile malware was successfully generated from known malware by using GP.
These attacks are seen to be quite effective against popular security solutions in the market.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy