Systematic literature review for malware visualization techniques

Analyzing the activities or the behaviors of malicious scripts highly depends on extracted features. It is also significant to know which features are more effective for certain visualization types. Similarly, selecting an appropriate visualization technique plays a key role for analytical descripti...

Full description

Saved in:
Bibliographic Details
Main Authors: Magalingam, Pritheega, Samy, Ganthan Narayana, Mohd. Khairudin, Wafa, Md. Senan, Mohd. Firham Efendy, Mohd. Ariffin, Aswami Fadillah, Yunos, Zahri
Format: Article
Language:English
Published: Little Lion Scientific 2018
Subjects:
Online Access:http://eprints.utm.my/id/eprint/86344/1/PritheegaMagalingam2018_SystematicLiteratureReviewforMalwareVisualization.pdf
http://eprints.utm.my/id/eprint/86344/
http://www.jatit.org/volumes/Vol96No16/13Vol96No16.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utm.86344
record_format eprints
spelling my.utm.863442020-08-31T14:02:30Z http://eprints.utm.my/id/eprint/86344/ Systematic literature review for malware visualization techniques Magalingam, Pritheega Samy, Ganthan Narayana Mohd. Khairudin, Wafa Md. Senan, Mohd. Firham Efendy Mohd. Ariffin, Aswami Fadillah Yunos, Zahri QA75 Electronic computers. Computer science Analyzing the activities or the behaviors of malicious scripts highly depends on extracted features. It is also significant to know which features are more effective for certain visualization types. Similarly, selecting an appropriate visualization technique plays a key role for analytical descriptive, diagnostic, predictive and prescriptive. Thus, the visualization technique should provide understandable information about the malicious code activities. This paper followed systematic literature review method in order to review the extracted features that are used to identify the malware, different types of visualization techniques and guidelines to select the right visualization techniques. An advanced search has been performed in most relevant digital libraries to obtain potentially relevant articles. The results demonstrate significant resources and types of features that are important to analyze malware activities and common visualization techniques that are currently used and methods to choose the right visualization technique in order to analyze the security events effectively. Little Lion Scientific 2018-08-31 Article PeerReviewed application/pdf en http://eprints.utm.my/id/eprint/86344/1/PritheegaMagalingam2018_SystematicLiteratureReviewforMalwareVisualization.pdf Magalingam, Pritheega and Samy, Ganthan Narayana and Mohd. Khairudin, Wafa and Md. Senan, Mohd. Firham Efendy and Mohd. Ariffin, Aswami Fadillah and Yunos, Zahri (2018) Systematic literature review for malware visualization techniques. Journal of Theoretical and Applied Information Technology, 96 (16). pp. 5338-5349. ISSN 1992-8645 http://www.jatit.org/volumes/Vol96No16/13Vol96No16.pdf
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Magalingam, Pritheega
Samy, Ganthan Narayana
Mohd. Khairudin, Wafa
Md. Senan, Mohd. Firham Efendy
Mohd. Ariffin, Aswami Fadillah
Yunos, Zahri
Systematic literature review for malware visualization techniques
description Analyzing the activities or the behaviors of malicious scripts highly depends on extracted features. It is also significant to know which features are more effective for certain visualization types. Similarly, selecting an appropriate visualization technique plays a key role for analytical descriptive, diagnostic, predictive and prescriptive. Thus, the visualization technique should provide understandable information about the malicious code activities. This paper followed systematic literature review method in order to review the extracted features that are used to identify the malware, different types of visualization techniques and guidelines to select the right visualization techniques. An advanced search has been performed in most relevant digital libraries to obtain potentially relevant articles. The results demonstrate significant resources and types of features that are important to analyze malware activities and common visualization techniques that are currently used and methods to choose the right visualization technique in order to analyze the security events effectively.
format Article
author Magalingam, Pritheega
Samy, Ganthan Narayana
Mohd. Khairudin, Wafa
Md. Senan, Mohd. Firham Efendy
Mohd. Ariffin, Aswami Fadillah
Yunos, Zahri
author_facet Magalingam, Pritheega
Samy, Ganthan Narayana
Mohd. Khairudin, Wafa
Md. Senan, Mohd. Firham Efendy
Mohd. Ariffin, Aswami Fadillah
Yunos, Zahri
author_sort Magalingam, Pritheega
title Systematic literature review for malware visualization techniques
title_short Systematic literature review for malware visualization techniques
title_full Systematic literature review for malware visualization techniques
title_fullStr Systematic literature review for malware visualization techniques
title_full_unstemmed Systematic literature review for malware visualization techniques
title_sort systematic literature review for malware visualization techniques
publisher Little Lion Scientific
publishDate 2018
url http://eprints.utm.my/id/eprint/86344/1/PritheegaMagalingam2018_SystematicLiteratureReviewforMalwareVisualization.pdf
http://eprints.utm.my/id/eprint/86344/
http://www.jatit.org/volumes/Vol96No16/13Vol96No16.pdf
_version_ 1677781164637552640
score 13.211869