Comparison of Signature-Based Detection and Behavior-Based Detection For Effective Malware Detection

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 16

Comparison of

Signature-based Detection
and Behavior-based
Detection for Effective
Malware Detection
Akbar Rosyidi - 20220130008
Table of
Introduction
01 What is malware and how Contents
Detect it

Study Literature
02 What Method we use to
detect it

Discussion
03 Sample Case and Evaluation

Conclusion
04 It is a Good Method?
01
Study
Literature
What is Malware
What is Malware
Malware is a term used to describe malicious software
that is designed to harm or exploit computer systems.
These types of software are designed to carry out
unauthorized actions on a computer system, such as
stealing sensitive information, compromising the
security of the system, or disrupting the normal
functioning of the computer.
Methods Of Malware Detection
In recent years, various
techniques have been
developed to detect malware,
ranging from signature-based
methods to behavior-based and
machine learning-based
approaches. Each of these
methods has its own strengths
and weaknesses, and the choice
of approach depends on the
specific requirements of the
organization and the type of
malware that is being targeted.
02
Introduction
What Method We Use To Detect It
Methods Of Malware Detection

01 02
Signature-based Behavior-based
identifies malware analyzes the behavior
based on its unique of software.
signature or pattern.

03 04
Heuristics-based Machine learning
uses algorithms and uses artificial intelligence
statistical analysis to and machine learning
detect malware. algorithms to detect
malware.
03
Discussion
Example Case
Signature-based detection Case

The signature-based detection system


works by comparing files on the system
against a database of predefined
signatures of known malware. The
database is updated regularly to ensure
that it contains the latest information on
known malware.
Signature-based detection Case

user on the system downloads a The system generates an


file from the internet that is
suspected to be malware alert

1 2 3 4

The signature-based detection the user is notified that


system determines that the file
contains a signature that is the file is malicious and
associated with a known piece of should not be opened
malware
Behavior-based detection Case

The behaviour-based detection system


works by analysing the behaviour of
software on the system to determine if it
is malicious. The system uses algorithms
to monitor the behaviour of software in
real-time and look for signs of malicious
activity.
Signature-based detection Case

user on the system downloads a The behaviour-based detection


new piece of software from the system generates an alert
internet

1 2 3 4

The behaviour-based detection the user is notified that


system determines that the
software is exhibiting behaviour the software is
that is associated with malware potentially malicious
and should not be run
Evaluation
Signature-based detection: Behaviour-based detection:

Pros: Pros:
• Simple and straightforward to • Effective against unknown malware.
implement. • Can detect malware that is designed to evade
• Requires relatively few resources. signature-based detection.
• Effective against known malware. •Does not rely on a database.

Cons: Cons:
• Can be easily defeated by malware. • More complex.
• The signature database must be updated • Can generate false positives.
regularly. • May require more expertise.
• Can generate false positives.
04
Conlusion
Conclusion

Given the advantages and


disadvantages of each
the detection of malware is
method, it is recommended to important to continue
a critical task for ensuring
use a combination of researching and developing
the security and stability of
different methods for new methods for detecting
computer systems. There
comprehensive protection malware, as the threat
are several methods for
against malware. This allows landscape is constantly
detecting malware,
the strengths of each method evolving, and new forms of
including signature-based
to complement each other malware are being developed
detection and behavior-
and provide a more complete all the time.
based detection
solution for detecting and
preventing malware
“Cybercrime is one of the
greatest threats facing our
society, and malware is one of
the most dangerous weapons in
the cybercriminal's arsenal.”
— Rob Wainwright, Former
Executive Director of Europol.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy