Comprehensive Review of Literature on Malware Attacks: Trends and Insights
DOI:
https://doi.org/10.69591/jcai.v1i1.18Abstract
Modern malware is very smart and designed to attack the target. Most of these sophisticated malwares are quite persistent and have escape mechanisms. Software that is malicious is bad. Researchers in both academia and industry face significant hurdles as a result of this malware's ability to harm computers without the knowledge of their owners. Given that harmful software refers to any software that exploits computer-based systems with malware in order to compromise data security, privacy, and availability, the aim of this study is to examine the literature that has been produced on malware attacks. This will allow us to carry out an analysis of the literature and see how the research has progressed in terms of quantity, content and means of publication. One cannot understand all aspects of most malware programs as they are so large and sophisticated. The correct implementation and use of anti-malware programs, as well as the education of Internet users about malware attacks, are crucial steps in defending the identity of online shoppers from malware attacks. Some of the shortcomings of screening approaches that need to be corrected for better screening were noted in critical appraisal of the study.
References
A. Vance, “Flow based analysis of Advanced Persistent Threats detecting targeted attacks in cloud computing,” in 2014 First International Scientific-Practical Conference Problems of Infocommunications Science and Technology, IEEE, 2014, pp. 173–176. Available: https://ieeexplore.ieee.org/abstract/document/6992342/
L. Li et al., “Understanding android app piggybacking: A systematic study of malicious code grafting,” IEEE Trans. Inf. Forensics Secur., vol. 12, no. 6, pp. 1269–1284, 2017.
A. F. A. Rahman, M. Daud, and M. Z. Mohamad, “Securing Sensor to Cloud Ecosystem using Internet of Things (IoT) Security Framework,” in Proceedings of the International Conference on Internet of things and Cloud Computing, Cambridge United Kingdom: ACM, Mar. 2016, pp. 1–5. doi: 10.1145/2896387.2906198.
Y. Chen and F. M. Zahedi, “Individuals’ internet security perceptions and behaviors,” Mis Q., vol. 40, no. 1, pp. 205–222, 2016.
A. Shashwat, D. Kumar, and L. Chanana, “An end to end security framework for service oriented architecture,” in 2017 International Conference on Infocom Technologies and Unmanned Systems (Trends and Future Directions)(ICTUS), IEEE, 2017, pp. 475–480. Available: https://ieeexplore.ieee.org/abstract/document/8286056/
B. Arief and D. Besnard, “Technical and human issues in computer-based systems security,” 2003. Available: https://kar.kent.ac.uk/58732
H. J. Highland, “A history of computer viruses—Introduction,” Computers & Security, vol. 16, no. 5. Elsevier, pp. 412–415, 1997. Available: https://www.sciencedirect.com/science/article/pii/S0167404897822456
F. Mira, “A systematic literature review on malware analysis,” in 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), IEEE, 2021, pp. 1–5. Available: https://ieeexplore.ieee.org/abstract/document/9422537/
H. M. Deylami, R. C. Muniyandi, I. T. Ardekani, and A. Sarrafzadeh, “Taxonomy of malware detection techniques: A systematic literature review,” in 2016 14th Annual Conference on Privacy, Security and Trust (PST), IEEE, 2016, pp. 629–636. Available: https://ieeexplore.ieee.org/abstract/document/7906998/
S. K. Cha, I. Moraru, J. Jang, J. Truelove, D. Brumley, and D. G. Andersen, “SplitScreen: Enabling efficient, distributed malware detection,” J. Commun. Netw., vol. 13, no. 2, pp. 187–200, 2011.
T. Y. Win, H. Tianfield, and Q. Mair, “Detection of malware and kernel-level rootkits in cloud computing environments,” in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing, IEEE, 2015, pp. 295–300. Available: https://ieeexplore.ieee.org/abstract/document/7371497/
M. K. Gupta, S. Shaw, and S. Chakraborty, “Pattern based malware detection technique in cloud architecture,” Inst Eng Manage Kolkata India, 2016. Available: https://www.researchgate.net/profile/Sanjay-Chakraborty-2/publication/306291981_Cloud_Based_Malware_Detection_Technique/links/58a6b4bfaca27206d9a7b396/Cloud-Based-Malware-Detection-Technique.pdf
N. Rakotondravony et al., “Classifying malware attacks in IaaS cloud environments,” J. Cloud Comput., vol. 6, no. 1, p. 26, Dec. 2017, doi: 10.1186/s13677-017-0098-8.
H. Sun, X. Wang, R. Buyya, and J. Su, “CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices,” Softw. Pract. Exp., vol. 47, no. 3, pp. 421–441, Mar. 2017, doi: 10.1002/spe.2420.
“15. Babu, N. M., & Murali, G. (2017, August). Malware... - Google Scholar.” Available: https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=15.%09Babu%2C+N.+M.%2C+%26+Murali%2C+G.+%282017%2C+August%29.+Malware+detection+for+multi+cloud+servers+using+intermediate+monitoring+server.+In+2017+International+Conference+on+Energy%2C+Communication%2C+Data+Analytics+and+Soft+Computing+%28ICECDS%29+%28pp.+3609-3612%29.+IEEE.&btnG=
R. M. Yadav, “Effective analysis of malware detection in cloud computing,” Comput. Secur., vol. 83, pp. 14–21, 2019.
P. Indirapriyadarsini, M. U. Mohiuddin, M. Taqueeuddin, C. S. Reddy, and T. Koushik, “Malware detection using machine learning and cloud computing,” Int J Res Appl Sci Eng Technol, vol. 8, no. 6, pp. 101–104, 2020.
D. Deyannis, E. Papadogiannaki, G. Kalivianakis, G. Vasiliadis, and S. Ioannidis, “TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud,” in Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, New Orleans LA USA: ACM, Mar. 2020, pp. 39–48. doi: 10.1145/3374664.3375748.
H. Chen, H. Leung, B. Han, and J. Su, “Automatic privacy leakage detection for massive android apps via a novel hybrid approach,” in 2017 IEEE International Conference on Communications (ICC), IEEE, 2017, pp. 1–7. Accessed: May 19, 2024. [Online]. Available: https://ieeexplore.ieee.org/abstract/document/7996335/
M. Abdullahi et al., “Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review,” Electronics, vol. 11, no. 2, p. 198, 2022.
O. I. Falowo, M. Ozer, C. Li, and J. B. Abdo, “Evolving Malware & DDoS Attacks: Decadal Longitudinal Study,” IEEE Access, 2024. Available: https://ieeexplore.ieee.org/abstract/document/10471391/
J. Boodai, A. Alqahtani, and K. Riad, “deep learning for malware detection: literature review,” J. Theor. Appl. Inf. Technol., vol. 102, no. 4, 2024. Available: http://www.jatit.org/volumes/Vol102No4/34Vol102No4.pdf
A. Verma and C. Shri, “Cyber Security: A Review of Cyber Crimes, Security Challenges and Measures to Control,” Vis. J. Bus. Perspect., p. 097226292210747, Feb. 2022, doi: 10.1177/09722629221074760.
T. R. Reshmi, “Information security breaches due to ransomware attacks-a systematic literature review,” Int. J. Inf. Manag. Data Insights, vol. 1, no. 2, p. 100013, 2021.
C. Senarak, “Port cyberattacks from 2011 to 2023: a literature review and discussion of selected cases,” Marit. Econ. Logist., vol. 26, no. 1, pp. 105–130, Mar. 2024, doi: 10.1057/s41278-023-00276-8.
F. A. Aboaoja, A. Zainal, F. A. Ghaleb, B. A. S. Al-Rimy, T. A. E. Eisa, and A. A. H. Elnour, “Malware detection issues, challenges, and future directions: A survey,” Appl. Sci., vol. 12, no. 17, p. 8482, 2022.
N. Z. Gorment, A. Selamat, and O. Krejcar, “A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works,” in Advances in Visual Informatics, vol. 13051, H. Badioze Zaman, A. F. Smeaton, T. K. Shih, S. Velastin, T. Terutoshi, B. N. Jørgensen, H. Aris, and N. Ibrahim, Eds., in Lecture Notes in Computer Science, vol. 13051. , Cham: Springer International Publishing, 2021, pp. 469–481. doi: 10.1007/978-3-030-90235-3_41.
M. U. Rehman, R. Akbar, M. Omar, and A. R. Gilal, “A Systematic Literature Review of Ransomware Detection Methods and Tools for Mitigating Potential Attacks,” in Computing and Informatics, vol. 2001, N. H. Zakaria, N. S. Mansor, H. Husni, and F. Mohammed, Eds., in Communications in Computer and Information Science, vol. 2001. , Singapore: Springer Nature Singapore, 2024, pp. 80–95. doi: 10.1007/978-981-99-9589-9_7.
T. Jabar and M. Mahinderjit Singh, “Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework,” Sensors, vol. 22, no. 13, p. 4662, 2022.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 Habiba Habib, Insha Rafique

This work is licensed under a Creative Commons Attribution 4.0 International License.
This work is licensed under a Creative Commons Attribution 4.0 International License. Authors retain copyright and grant the journal the right of first publication, with the work simultaneously licensed under a CC-BY 4.0 License.