Verified Document

Polymorphic Malware The Threat Presented Term Paper

Therefore it has been suggested that it always preferable to not only pay a subscription to update software currently installed on the system, but to also install the latest software wherever a new version is released (Andrew, 2005). All programs which are employed should be regularly updated to ensure that they are kept current, and should be run as often as possible to ensure that any threat present within the network does not embed itself too deeply, making it more difficult to detect and remove. If available, all possible auto-protect features should be enabled within the network, allowing the system to update itself automatically on a regular basis, and reducing the risk of malware infiltrating the network.

It is also recommended that frequent checks are performed for security patches and updates which are offered by Microsoft for Windows users, or by the manufacturers of other operating systems. Although enabling auto-protect and auto-update features on the system should ensure that these are installed as soon as they are available, it is important to check regularly, as the announcement may serve as an alert to malware programmers of possible areas in which the security of the system may be breached of which they were not previously aware (Andrew, 2005).

Take periodic snapshots of the system, so that should infected data need to be removed, the system can be restored to a previous point. This may not be a reliable solution to the problem however, as with polymorphic malware it is possible that the malicious code may also be restored if it were present at the earlier time in a different variant. The only truly reliable way in which to ensure that the system is entirely clean once it has been infected with polymorphic malware is to format the hard drive and remove all data, reinstalling operating systems from scratch (Hsu et al., 2006).

Future Directions for Anti-malware Software

There have been many parallels drawn between the computer operating environment and the human body; this has led to a concentration of research which uses the human body as its inspirational model for the development of anti-viral and anti-malware software. There are...

The development of virally-immune, self-healing or self-defending information systems networks hold particular promise (Rice and Martin, 2007), although as is evident in the human body, there is still no guarantee that new types of viral software will not emerge which the system would remain unable to deal with.
Conclusions

Although there is undoubtedly a great threat posed by polymorphic malware in the current it world, there are methods to decrease the likelihood of any network becoming infected, most of which centre around constant vigilance, and education of all system users. While there are currently still many difficulties in the detection of polymorphic malware should it infiltrate a system, there is hope that current research will yield new tools which will guard against these malicious attacks.

References

Andrew, a.M. (2005) Cybernetics and systems on the web: internet newsletters. Kybermetes, Vol 34, No 7/8, pp. 1278-1281.

Commtouch: Malware Writers' Tactics Evolving" (2007) eWeek, May 2, 2007. Retrieved September 7, 2007, at http://find.galegroup.com.libezproxy.open.ac.uk/itx/start.do?prodId=CDB.

Hsu, F., Chen, H., Ristenpart, T., Li, J. And Su, Z. (2006) Back to the future: A framework for automatic malware removal and system repair. Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC '06).

Rice, J. And Martin, N. (2007) Using biological models to improve innovation systems: The case of computer anti-viral software. European Journal of Innovation Management, Vol 10, No 2, pp. 201-214.

Sulaiman, a., Ramamoorthy, K., Mukkamala, S. And Sung, a.H. (2005) Malware examiner using disassembled code (MEDiC). Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, pp. 428-429.

Xu, J.Y., Sung, a.H., Chavez, P. And Mukkamala, S. (2004) Polymorphic malicious executable scanner by API sequence analysis. Proceedings of the Fourth International Conference on Hybrid Intelligence Systems (HIS '04).

Sources used in this document:
References

Andrew, a.M. (2005) Cybernetics and systems on the web: internet newsletters. Kybermetes, Vol 34, No 7/8, pp. 1278-1281.

Commtouch: Malware Writers' Tactics Evolving" (2007) eWeek, May 2, 2007. Retrieved September 7, 2007, at http://find.galegroup.com.libezproxy.open.ac.uk/itx/start.do?prodId=CDB.

Hsu, F., Chen, H., Ristenpart, T., Li, J. And Su, Z. (2006) Back to the future: A framework for automatic malware removal and system repair. Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC '06).

Rice, J. And Martin, N. (2007) Using biological models to improve innovation systems: The case of computer anti-viral software. European Journal of Innovation Management, Vol 10, No 2, pp. 201-214.
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Benchmarking Key Loggers for Gathering Digital Evidence on Personal...
Words: 8600 Length: 18 Document Type: Multiple Chapters

Benchmarking Keyloggers for Gathering Digital Evidence on Personal Computers Keyloggers refers to the hardware or software programs, which examine keyboard and mouse activity on a computer in a secretive manner so that the owner of the computer is not aware that their actions are monitored. The keyloggers accumulate the recorded keystrokes for later recovery or remotely convey it to the person employing them. Keyloggers aimed to serve as spyware and currently

Network and Computer Security
Words: 1914 Length: 6 Document Type: Essay

Computer and Network Security Description of Information Environment of my Workplace My workplace is Verizon Communication and I have been working for the company for more than 5 years. The Verizon Communication major business is to provide communication solutions for businesses and individuals through the wired and wireless communication devices. The company provides complete communication systems and devices for individual, small business, medium business and enterprises. However, the company sells bulk of

Wireless Networking Technology and Security:
Words: 7497 Length: 22 Document Type: Research Proposal

Bluetooth devices use encryption security and this makes the requirement of a "unique key session key to derive per-packet keys thus avoiding frequent key reuse." (Kennedy and Hunt, 2008, p.4) Kennedy and Hunt report that ZigBee is a reasonably priced low energy consumption two-way CDMA/BA-based wireless communications standard which is based on IEEE 802.15.4 which is referred to commonly as a 'Low Rate Wireless Personal Area Networks (LR-WPANs) and which

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now