Cyber attacks are currently blooming, as the attackers reap significant profits from them andface a limited risk when compared to committing the ‘‘classical’’ crimes. One of the major componentsthat leads to the successful compromising of the targeted system is malicious software. It allows using thevictim’smachineforvariousnefariouspurposes,e.g.,makingitapartofthebotnet,miningcryptocurrencies,or holding hostage the data stored there. At present, the complexity, proliferation, and variety of malwarepose a real challenge for the existing countermeasures and require their constant improvements. That iswhy, in this paper we first perform a detailed meta-review of the existing surveys related to malware and itsdetection techniques, showing an arms race between these two sides of a barricade. On this basis, we reviewthe evolution of modern threats in the communication networks, with a particular focus on the techniquesemploying information hiding. Next, we present the bird’s eye view portraying the main development trendsin detection methods with a special emphasis on the machine learning techniques. The survey is concludedwith the description of potential future research directions in the field of malware detection.
- DFIR Resources
- Overview of Current Malware Threats and Trends in Their Detection

Overview of Current Malware Threats and Trends in Their Detection
NewHot 62 1
DFIR Resources
Cheats & Infographics
Malware
Research and Documentation
White Papers & Journals
User comments
There are no user comments for this listing.
Already have an account? Log in now or Create an account