Systematic literature review for malware visualization techniques
Analyzing the activities or the behaviors of malicious scripts highly depends on extracted features. It is also significant to know which features are more effective for certain visualization types. Similarly, selecting an appropriate visualization technique plays a key role for analytical descripti...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Little Lion Scientific
2018
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/86344/1/PritheegaMagalingam2018_SystematicLiteratureReviewforMalwareVisualization.pdf http://eprints.utm.my/id/eprint/86344/ http://www.jatit.org/volumes/Vol96No16/13Vol96No16.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utm.86344 |
---|---|
record_format |
eprints |
spelling |
my.utm.863442020-08-31T14:02:30Z http://eprints.utm.my/id/eprint/86344/ Systematic literature review for malware visualization techniques Magalingam, Pritheega Samy, Ganthan Narayana Mohd. Khairudin, Wafa Md. Senan, Mohd. Firham Efendy Mohd. Ariffin, Aswami Fadillah Yunos, Zahri QA75 Electronic computers. Computer science Analyzing the activities or the behaviors of malicious scripts highly depends on extracted features. It is also significant to know which features are more effective for certain visualization types. Similarly, selecting an appropriate visualization technique plays a key role for analytical descriptive, diagnostic, predictive and prescriptive. Thus, the visualization technique should provide understandable information about the malicious code activities. This paper followed systematic literature review method in order to review the extracted features that are used to identify the malware, different types of visualization techniques and guidelines to select the right visualization techniques. An advanced search has been performed in most relevant digital libraries to obtain potentially relevant articles. The results demonstrate significant resources and types of features that are important to analyze malware activities and common visualization techniques that are currently used and methods to choose the right visualization technique in order to analyze the security events effectively. Little Lion Scientific 2018-08-31 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/86344/1/PritheegaMagalingam2018_SystematicLiteratureReviewforMalwareVisualization.pdf Magalingam, Pritheega and Samy, Ganthan Narayana and Mohd. Khairudin, Wafa and Md. Senan, Mohd. Firham Efendy and Mohd. Ariffin, Aswami Fadillah and Yunos, Zahri (2018) Systematic literature review for malware visualization techniques. Journal of Theoretical and Applied Information Technology, 96 (16). pp. 5338-5349. ISSN 1992-8645 http://www.jatit.org/volumes/Vol96No16/13Vol96No16.pdf |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Magalingam, Pritheega Samy, Ganthan Narayana Mohd. Khairudin, Wafa Md. Senan, Mohd. Firham Efendy Mohd. Ariffin, Aswami Fadillah Yunos, Zahri Systematic literature review for malware visualization techniques |
description |
Analyzing the activities or the behaviors of malicious scripts highly depends on extracted features. It is also significant to know which features are more effective for certain visualization types. Similarly, selecting an appropriate visualization technique plays a key role for analytical descriptive, diagnostic, predictive and prescriptive. Thus, the visualization technique should provide understandable information about the malicious code activities. This paper followed systematic literature review method in order to review the extracted features that are used to identify the malware, different types of visualization techniques and guidelines to select the right visualization techniques. An advanced search has been performed in most relevant digital libraries to obtain potentially relevant articles. The results demonstrate significant resources and types of features that are important to analyze malware activities and common visualization techniques that are currently used and methods to choose the right visualization technique in order to analyze the security events effectively. |
format |
Article |
author |
Magalingam, Pritheega Samy, Ganthan Narayana Mohd. Khairudin, Wafa Md. Senan, Mohd. Firham Efendy Mohd. Ariffin, Aswami Fadillah Yunos, Zahri |
author_facet |
Magalingam, Pritheega Samy, Ganthan Narayana Mohd. Khairudin, Wafa Md. Senan, Mohd. Firham Efendy Mohd. Ariffin, Aswami Fadillah Yunos, Zahri |
author_sort |
Magalingam, Pritheega |
title |
Systematic literature review for malware visualization techniques |
title_short |
Systematic literature review for malware visualization techniques |
title_full |
Systematic literature review for malware visualization techniques |
title_fullStr |
Systematic literature review for malware visualization techniques |
title_full_unstemmed |
Systematic literature review for malware visualization techniques |
title_sort |
systematic literature review for malware visualization techniques |
publisher |
Little Lion Scientific |
publishDate |
2018 |
url |
http://eprints.utm.my/id/eprint/86344/1/PritheegaMagalingam2018_SystematicLiteratureReviewforMalwareVisualization.pdf http://eprints.utm.my/id/eprint/86344/ http://www.jatit.org/volumes/Vol96No16/13Vol96No16.pdf |
_version_ |
1677781164637552640 |
score |
13.211869 |