Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Malware
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{short description|Malicious software}} {{Use dmy dates|date=August 2017}} {{Computer hacking}} '''Malware''' (a [[portmanteau]] of '''''malicious software''''')<ref name=":4">Tahir, R. (2018). [https://www.mecs-press.net/ijeme/ijeme-v8-n2/IJEME-V8-N2-3.pdf A study on malware and malware detection techniques]. {{Webarchive|url=https://web.archive.org/web/20230110063748/https://www.mecs-press.net/ijeme/ijeme-v8-n2/IJEME-V8-N2-3.pdf|date=10 January 2023}}. ''International Journal of Education and Management Engineering'', ''8''(2), 20.</ref> is any [[software]] intentionally designed to cause disruption to a [[computer]], [[server (computing)|server]], [[Client (computing)|client]], or [[computer network]], leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's [[computer security]] and [[privacy]].<ref name=":4" /><ref>{{cite web|url=https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/CaseStudy-002.pdf|title=An Undirected Attack Against Critical Infrastructure|publisher=[[United States Computer Emergency Readiness Team]](Us-cert.gov)|access-date=28 September 2014|archive-date=24 December 2016|archive-url=https://web.archive.org/web/20161224070034/https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/CaseStudy-002.pdf|url-status=live}}</ref><ref name=":1">{{Cite book|last1=Cani|first1=Andrea|last2=Gaudesi|first2=Marco|last3=Sanchez|first3=Ernesto|last4=Squillero|first4=Giovanni|last5=Tonda|first5=Alberto|title=Proceedings of the 29th Annual ACM Symposium on Applied Computing|chapter=Towards automated malware creation|date=2014-03-24|chapter-url=https://doi.org/10.1145/2554850.2555157|series=SAC '14|location=New York, NY, USA|publisher=Association for Computing Machinery|pages=157β160|doi=10.1145/2554850.2555157|isbn=978-1-4503-2469-4|s2cid=14324560}}</ref><ref>{{Cite journal|last=Brewer|first=Ross|date=2016-09-01|title=Ransomware attacks: detection, prevention and cure|url=https://www.sciencedirect.com/science/article/pii/S1353485816300861|journal=Network Security|language=en|volume=2016|issue=9|pages=5β9|doi=10.1016/S1353-4858(16)30086-1|issn=1353-4858|access-date=2 December 2021|archive-date=10 April 2019|archive-url=https://web.archive.org/web/20190410072104/https://www.sciencedirect.com/science/article/pii/S1353485816300861|url-status=live}}</ref><ref>{{Cite journal|last1=Zhong|first1=Fangtian|last2=Chen|first2=Zekai|last3=Xu|first3=Minghui|last4=Zhang|first4=Guoming|last5=Yu|first5=Dongxiao|last6=Cheng|first6=Xiuzhen|author6-link=Xiuzhen Cheng|date=2022|title=Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification|url=https://ieeexplore.ieee.org/document/9737370|journal=IEEE Transactions on Computers|volume=72|issue=2|pages=438β451|doi=10.1109/TC.2022.3160357|arxiv=2108.04314|s2cid=236965755|issn=0018-9340|access-date=2 September 2022|archive-date=2 September 2022|archive-url=https://web.archive.org/web/20220902175001/https://ieeexplore.ieee.org/document/9737370/|url-status=live}}</ref> Researchers tend to classify malware into one or more sub-types (i.e. [[computer virus]]es, [[Computer worm|worms]], [[Trojan horse (computing)|Trojan horses]], [[logic bomb]]s, [[ransomware]], [[spyware]], [[adware]], [[rogue software]], [[Wiper (malware)|wipers]] and [[keyloggers]]).<ref name=":4" /> Malware poses serious problems to individuals and businesses on the Internet.<ref name=":2">{{Cite journal|last1=Kim|first1=Jin-Young|last2=Bu|first2=Seok-Jun|last3=Cho|first3=Sung-Bae|date=2018-09-01|title=Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders|url=https://www.sciencedirect.com/science/article/pii/S0020025518303475|journal=Information Sciences|language=en|volume=460β461|pages=83β102|doi=10.1016/j.ins.2018.04.092|s2cid=51882216|issn=0020-0255|access-date=2 December 2021|archive-date=23 June 2020|archive-url=https://web.archive.org/web/20200623174252/https://www.sciencedirect.com/science/article/pii/S0020025518303475|url-status=live}}</ref><ref>{{Cite journal|last1=Razak|first1=Mohd Faizal Ab|last2=Anuar|first2=Nor Badrul|last3=Salleh|first3=Rosli|last4=Firdaus|first4=Ahmad|date=2016-11-01|title=The rise of "malware": Bibliometric analysis of malware study|url=https://linkinghub.elsevier.com/retrieve/pii/S1084804516301904|journal=Journal of Network and Computer Applications|language=en|volume=75|pages=58β76|doi=10.1016/j.jnca.2016.08.022|access-date=30 April 2022|archive-date=26 June 2022|archive-url=https://web.archive.org/web/20220626040626/https://linkinghub.elsevier.com/retrieve/pii/S1084804516301904|url-status=live}}</ref> According to [[NortonLifeLock|Symantec]]'s 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.<ref name=":0">{{Cite journal|last1=Xiao|first1=Fei|last2=Sun|first2=Yi|last3=Du|first3=Donggao|last4=Li|first4=Xuelei|last5=Luo|first5=Min|date=2020-03-21|title=A Novel Malware Classification Method Based on Crucial Behavior|journal=Mathematical Problems in Engineering|volume=2020|pages=1β12|doi=10.1155/2020/6804290|issn=1024-123X|doi-access=free}}</ref> [[Cybercrime]], which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy US$6 trillion in 2021, and is increasing at a rate of 15% per year.<ref name="Morgan">{{cite web|last=Morgan|first=Steve|title=Cybercrime To Cost The World $10.5 Trillion Annually By 2025|work=Cybercrime magazine website|publisher=Cybersecurity ventures|date=13 November 2020|url=https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/|format=|doi=|accessdate=5 March 2022|archive-date=5 March 2022|archive-url=https://web.archive.org/web/20220305072352/https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/|url-status=live}}</ref> Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the [[Electricity infrastructure|electricity distribution network]].<ref>{{Cite journal|last1=Eder-Neuhauser|first1=Peter|last2=Zseby|first2=Tanja|last3=Fabini|first3=Joachim|date=2019-06-01|title=Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types|journal=Journal of Computer Virology and Hacking Techniques|language=en|volume=15|issue=2|pages=109β125|doi=10.1007/s11416-018-0325-y|s2cid=255164530|issn=2263-8733|doi-access=free}}</ref> The defense strategies against malware differ according to the type of malware but most can be thwarted by installing [[antivirus software]], [[firewall (computing)|firewalls]], applying regular [[Patch (computing)|patches]], [[Network security|securing networks]] from intrusion, having regular [[backup]]s and [[Quarantine (antivirus program)|isolating infected systems]]. Malware can be designed to evade antivirus software detection algorithms.<ref name=":0" />
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)