Common Malware Types
Downloads
Over the last decades, there were lots of studies made on malware and their countermeasures. The most recent reports emphasize that the invention of malicious software is rapidly increasing. Moreover, the intensive use of networks and Internet increases the ability of the spreading and the effectiveness of this kind of software. On the other hand, researchers and manufacturers making great efforts to produce anti-malware systems with effective detection methods for better protection on computers. This paper presents a detailed classification of malware, specification of each type and malicious actions that cybercriminals are taking through them, in order to steal private information and damage users’ information systems. In the end, there will be more about different types of defense mechanism against certain malware, that will show protection and will make the system to be immune when an attack occurs.
Downloads
Wjeb Gharibi, Studying and Classification of the Most Significant Malicious Software.
J. Markoff, Defying experts, Rogue Computer Code Still Lurks, New York Times, 2009.
What is the Difference: Viruses, Worms, Trojans, and Bots? [Online] Available: https://www.cisco.com/c/en/us/about/security-center/virus-differences.html.
M. Barwise. What is an internet worm?, 2010.
Understanding Denial-of-Service Attacks, US-CERT, 2013.
M. Prince, Empty DDoS Threats: Meet the Armada Collective, 2016.
Kiyuna and Conyers, Cyberwarfare, 2015.
S.V. Raghavan, An investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks, 2011.
J. Schofield, How can I remove a ransomware infection?, The Guardian, 2016.
M. Curtin, Introduction to Network Security, 2015.
Distributed Denial of Service Attacks (DDoS) Resources, Pervasive Technology Labs at Indiana University, 2009.




