Question

Based on your findings, compare and contrast the different types of malware detection methodologies. Explain how...

Based on your findings, compare and contrast the different types of malware detection methodologies. Explain how you would deploy and maintain IDS with up-to-date signatures, changes in traffic patterns, and deviations that are common on computing infrastructures.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Malware -A malicious software which is used for intruding computer system’s security that include integrity confidentiality,and availability of data.
Malware Detection-Malware detection methodology is used to identify whether a program has malicious or not.
Different types of malware detection-Malware detection techniques is of three types.

1)Signature - In malware a sequence of bit which is known as signature is identified by antivirus. the signature of
malware are stored in a database for matching.that why it is also known as matching.it is either static ,dynamic or hybrid.
Only known malware can be detected owing to signature.It uses minimum no of resources. Unknown malware can not be detected
2)Heuristic - In heuristic detection technique the behavior of system is identified i.e. whether its behavior of system is
normal or not.The system's behavior detection can be done by Data collection ,Interpretation and by using matching algorithm.So in this technique new malware can be detected also.It uses machine learning and AI methods for detecting malware.But problem is that it uses more resources and data need to be modified for new malware.
3)Specification- In this technique applications are watched according to behavior of system.It is based on the analysis of the behavior that are described in the system specification.In this technique a new malware whether it is Known , unknown or new malware can be detected.It is not much efficient in detection of new malware and specification development of system is time consuming process.

Deployment and maintaining of IDS-Installing a Network IDS (NIDS) onto a network requires planning. Initial Industry Standard IDS deployment dictates use of network-based IDS, then host-based IDS. This ensures the
network, and then host devices are protected.First of all we must determine policy, junction of maintenance after that
Comparing IPS and IDS should be done.And then gather network topology diagram, identify physical infrastructure,network name and network function.
Update signatures- for fully protected, it is important that one regularly update the list of attacks an IDS is
configured to recognize. Intruders constantly change attack styles, so optimal protection requires updating the IDS
signature files as often as possible.
we use anomaly-based malware detection for computing systems and network traffic.

Add a comment
Know the answer?
Add Answer to:
Based on your findings, compare and contrast the different types of malware detection methodologies. Explain how...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Microbiology: 1. Explain how you would use Robert Koch's postulates to determine that Bacterium HU220 is...

    Microbiology: 1. Explain how you would use Robert Koch's postulates to determine that Bacterium HU220 is the causative agent of the disease XYZ. Also, explain why Koch's postulates cannot be fulfilled for some microorganisms. 2. Discuss the role of phages in bacterial pathogenesis. 3. The complement system functions as a mediator of both innate and adaptive host defense mechanisms. Given your knowledge of host-defense system, discuss the role played by the complement system in both adaptive and innate immunity, 4....

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • explain 1 or 2 molecular details in how epigenetics may allow melanoma cells to outsmart BRAF inhibitors **This is for a genetics course Seope: This science commentary claims that epigeneties pl...

    explain 1 or 2 molecular details in how epigenetics may allow melanoma cells to outsmart BRAF inhibitors **This is for a genetics course Seope: This science commentary claims that epigeneties plays a role in cancer cells becoming therapy-resistant. The language used is generalized for the non-scientist and does not include any molecular details, such as methylation of a specific nucleotide in an allele or modification of a specific histone tail amino acid. Your task (individually or in a group of...

  • Assignment Details The Unit 6 Assignment requires you to consider how effective teams are built. Some...

    Assignment Details The Unit 6 Assignment requires you to consider how effective teams are built. Some considerations in this assignment include the traits of an effective team leader as well as the strategies one would use to recruit team members that would work effectively together. Using material from Chapter 12 of your text as well as the article in the supplemental reading (Rao, 2016), you will write an informative essay sharing best practices for effective team-building. Outcomes evaluated through this...

  • answer the questions based on the informations on the 3 pictures please: What are the essential...

    answer the questions based on the informations on the 3 pictures please: What are the essential responsibilities of a structural designer or engineer in designing a structure? What factors would you consider and why when planning the design of a building structure? You are the project team leader for the design of a single family house in southwest Houston area. Discuss the types of structural loads you think are important and explain why.​​​​​​​ d) Thermal load changes in perature cause...

  • 4. Perform a SWOT analysis for Fitbit. Based on your assessment of these, what are some strategic options for Fitbit go...

    4. Perform a SWOT analysis for Fitbit. Based on your assessment of these, what are some strategic options for Fitbit going forward? 5. Analyze the company’s financial performance. Do trends suggest that Fitbit’s strategy is working? 6.What recommendations would you make to Fitbit management to address the most important strategic issues facing the company? Fitbit, Inc., in 2017: Can Revive Its Strategy and It Reverse Mounting Losses? connect ROCHELLE R. BRUNSON Baylor University MARLENE M. REED Baylor University in the...

  • My topic is diabetes 597690/viewContent/7888874/View The Science of Popular Diets The Impact of Nutrition Practices on...

    My topic is diabetes 597690/viewContent/7888874/View The Science of Popular Diets The Impact of Nutrition Practices on Human Wellness Understanding the Dietary Needs of Special Populations Consider that up until this point in Module 2, we have been focused on the nutritional needs and diet plans for healthy, adult individuals. The AMDRS used to calculate caloric needs have been determined to fit a general population of these individuals. In addition, there has been little need to consider deficiencies or toxicities of...

  • Read the case: Netflix Inc.: The Second Act - Moving into Streaming and complete your case...

    Read the case: Netflix Inc.: The Second Act - Moving into Streaming and complete your case analysis. Discuss the following: 1) briefly summarize the key marketing strategy issues in the case that are still relevant TODAY in addition to contemporary issues you find via research; 2) make thorough recommendations on how the issues should be handled; 3) provide a justification for the recommendations. Case write-ups should be 3-5 pages, double spaced, 12 font size in Times New Roman. The case...

  • Below is the information: It is important to understand the different leadership styles employed by nursing...

    Below is the information: It is important to understand the different leadership styles employed by nursing leaders in healthcare organizations and to understand their significance on nursing practice and patient outcomes, for better or for worse. Objective: Read the articles from Nursing Standard (PDF) and Bradley University (PDF). In -250 words, formulate an opinion on the following: 1. Reflect on an occasion where you experienced ineffective leadership (doesn't have to be in the hospital). What behaviors did they display? What...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT