IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

An Experimental Analysis on Detection of Corona Virus Malware Attacks and Its Preventive Measures

An Experimental Analysis on Detection of Corona Virus Malware Attacks and Its Preventive Measures
View Sample PDF
Author(s): Soumi Banerjee (Department of Information Technology, Ramrao Adik Institute of Technology, India), Swapnil Shinde (Department of Information Technology, Ramrao Adik Institute of Technology, India)and Anita Patil (Department of Information Technology, Ramrao Adik Institute of Technology, India)
Copyright: 2021
Pages: 22
Source title: Handbook of Research on Cyber Crime and Information Privacy
Source Author(s)/Editor(s): Maria Manuela Cruz-Cunha (Polytechnic Institute of Cávado and Ave, Portugal)and Nuno Mateus-Coelho (Lusófona University, Portugal)
DOI: 10.4018/978-1-7998-5728-0.ch004

Purchase

View An Experimental Analysis on Detection of Corona Virus Malware Attacks and Its Preventive Measures on the publisher's website for pricing and purchasing information.

Abstract

Coronavirus has affected China massively. This creates dread among the peoples in the world. Cyber criminals tend to take advantage of fear through malicious activities. Cyber criminals generate a phishing and spam campaign to trick the people in the name of Coronavirus. According to current analysis, the criminals hide malware behind different documents that are shared for creating awareness for the people regarding Coronavirus. Kaspersky technologies discovered that such documents contain viruses, trojans, worms, etc. (malwares) that can infect other files on victims' systems and corrupt or encrypt them. In this chapter, the nature, behavior, and types of different malware and their impacts are analyzed. An analysis is performed on how attackers' attacks using that malware to misuse the victim's data and what the techniques used to perform the attack are. In this chapter, an experimental analysis is performed to detect these attacks, and also measures and guidelines are proposed to prevent these types of attacks.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom