Research Aim
What are malwares?
How the growth in the malware takes place from past to future?
What are the impacts of malware on the electronic gadgets and the users?
How the growth of the malware risen up with the innovation in the digitization?
What are the countermeasures which can reduce the malware attacks?
The digital revolution has increased the threat to the attacks of malware and viruses. Every premise on the internet is coping up with the threat of attacks. Malware are the malicious software which can get associated with the software code of the application software to disrupt the functioning and modify and manipulate the data. These malicious software are intentionally get attached by the hacker in the software to adversely affect the computer system. The malware attacks were recently grows with the development in the field of mobile phones and other electronic gadgets. The innovation of the smart phones connects the user with the global world. With the few clicks, the user can fulfil their requirement with the availability of digital market. The malwares are the biggest threat in the global market. The inclusion of the third party in the transaction process can result into the spreading of the malwares attack from the global electronic platform. The literature review is performed to analyse the past, present, and future growth of the malwares which can adversely affects the functioning of the electronic applications. The attackers take advantage of the electronic application for the spreading of the malware in the global market. The malwares are comprised of various types of viruses and worms such as Trojan horse, spyware, ransom ware, and others. These malicious programs are developed by the cyber-criminals for modifying the confidential data of the user, stealing the private information, monitoring of the computer activities program, and others. It is the unauthorised accessing of the user account without their permission [1]. The innovations in the electronic gadgets are prone areas of the malware attacks. The countermeasures should be designed for developing security system against the attacks of malwares to protect and secure the premises of the internet. In this paper, we will undertake the literature review on the past, present, and future of the malwares.
The aim of the research is to analyse the growth of the malware from past to future by conducting a literature review. The gaps of the research should be analysed for the future direction of the research proposal. The focus should be given on the countermeasures to minimize the effects of the malware of the computer, mobile premises, and other electronic gadgets.
Research Objective
The objectives of the research are highlighted below:
- Analysis of the past, present, and future growth of the malware
- Impact of malware on the smart phone application
- Relationship between android operating system and the malwares
- Countermeasures for preserving the electronic gadgets with the malware attacks
- Impact of malware on the user
The literature review is conducted for analysing the past, present, and future of the malware. From the research it has been seen that the cyber-criminal activities are increased with the innovations in the digitization because it connects the user with the global world. Millions of transactions are carried out in the fraction of seconds which opens a door for cyber-criminal to hack the confidential information of the user [2]. The cyber-criminal activities are carried out through the initialization of the malware software code in the android application.
From the research, we come across that different malwares are developed for performing different operations. In the past, simple virus programs are developed to disrupt the functionality of the computer system. The activity of virus inclusion increases the sale of the anti-virus program. Later on, the activity of piracy was initiated for copying the data of the user without the permission of the owner. With the innovation of the android operating system, it connects the user with the GPS system which increases the chance of hijacking the secret information of the user such as credit card details, debit card details, bank account details, PIN numbers, and others [3]. The leakages of the confidential information can have adverse effect on the user. The droid dream light is the malware which is used for extracting the information by analysing the browsing history of the user, fetching the IMEI number of the digitization, stealing of the confidential information of the user, and others. There are a risk of data leakages of the confidential information of the user while making payment transaction in the digital market by making use of credit card details, bank accounts, PIN number, and others [4].
The phishing attack is based on generating emails, false call, and SMS. The false calls are generated to the customers for getting their private and confidential information [5]. The confidential information of the user can be used for fund transfer. The root exploitation can be effectively carried out for modifying the underlying information through the malware named as Exploid, Zimperlich, Rageagainstthecage, and others. These malwares root out in the software for getting privilege to modify the information of the application. Search engine optimization attacks are comprised of positioning the malware sites on the top of the search. The clicking on the fraud websites will result into the inclusion of malwares in the computer system by downloading of the malware software into the electronic gadgets of the user. It has been researched that the android application will results into the downloading of the malicious code in the premises [6]. The loop holes are created in the android applications which are the chance of fraud and hijacking activities to occur.
Literature Reviews
The innovation in the field of technologies increases the scenario of malicious activities. In the past, the phishing activitees were majorly occurs for hijacking the confidential details of the user by making false calls and SMS activities [7]. From the research, it has been found that 45% of the organization have experienced a phishing attack in the past.
The future plan is to prepare a mitigation and countermeasure for minimizing the impact of malware on the premises of the organization and personal data of the customers [8]. It is required to analyse the data storage where the users are going to store their data, analysing the susceptible of malware occurrence, developing new rules and regulations for determining strategy to preserve the confidential data, deploying training and development program for the employees for analysing the phishing threat associated with the organization working functional plan, deploying right security procedures for deploying security solutions associated with the cloud email functioning, and others.
The appropriate countermeasures should be prepared for minimizing the effect of malware on the organizational premises.
Droid ranger is the application which is based on heuristic approach for detecting the presence of malware. This application is working on identifying the occurrence of suspicious activity. The SCanDroid is an application which is used for analysing the flow of data within the working structure of the organization. It is based on the uni-addressing system for analysing the policies of the content providers. ComDroid is the application used for analysing and detecting the vulnerabilities associated with the communication protocols. The inter-processing addressing system should be used measuring the occurrence of the vulnerabilities associated with the android operating system. The executable files of the processing units are used for analysing the intent and component associated with the potential malwares. The analysis of the control flow and data flow helps in finding the gaps for the data leakages during the development of the structure. The deployment of the sensitive hardware such as GPS, Sensor, cameras, and others is helpful for analysing the potential leakages in the data flow control structure. The droidscope is based on emulation technology which is used for inspecting working of the android devices based on amalgamation of hardware, virtual machine, and operating system. The sequence of logging behaviour can be analysed by detecting malware for constructing the variation in runtime.
The innovation in the technological advancement results in the different malware attacks. The protection mechanism should be developed for every field. The other major field is cloud computing technology. Most of the organizations are transforming their working tactics with the cloud based environment. The protection mechanism should be developed for cloud based environment. The paranoid android is helpful for running the application on the virtual environment securely to deploy the cloud services. The IoT is the next generation of the technological world. The hackers will develop new malwares for retrieving data from the real system. The IoT devices and communication is facing problem of security in managing communication between the participating units. Hackers can retrieve the information of the customers from the online database where the personal information of the user is stored.
It has been analysed that the malware are the serious attacks which should be applied countermeasure for preserving the quality standard of the application. The mitigation policies should be developed for preserving the privacy of the user and the organization. There are few gaps in the countermeasures which are prepared for malware detection and prevention. The new proposed model should be capable of managing and detecting malware attacks on the multiple applications. There are some proposed models which are used defining malware attacks effectively according to the future innovations in the malware. Some of the countermeasures are listed below:
Attacks based on pattern matching: The information of the user are collected from the different application for customised the pattern matching. The statistical control should be developed for analysing the machine learning algorithm. The control policies should be used for analysing the malicious application. It is capable of detecting and avoiding malicious code in the working architecture of the application.
Attacks based on repackaging of application: The numbers of application are newly designed for providing quality service to the customers. The legitimating application should be used for detecting the difficulties in the malicious application. The reverse engineering procedures are used for defining the source code for analysing the presence of malicious code.
The increasing demand of social media platforms opens door for hacking the information directly from the user account. It is required to develop security procedures for managing the botnets among the communication forum of customer to customers. The botnets are used for detecting the data leakages from the WI-FI access points. The botnet network helps in analysing the flow of information and detecting the presence of malwares in the data packets sends in the peer to peer networking channels [9].
The execution of the native codes on the android operating system should be checked for analysing the presence of the malwares. The auto-response should be generated by using the hash value procedures for determining the presence of the malware.
The future direction of the research is to develop a model which is capable of overcoming the complexities and limitation of the researched countermeasures. The single solution should be prepared which is capable of running on different operating system such as android, windows, apple, and others for detecting the presence of malware in the newly designed application. The effective solution should be prepared for exploring the anti-virus capabilities which is capable enough for managing the presence of malware in the system application (Amro, 2018). The proactive detection of the malware helps in preserving the confidentiality, integrity, accuracy, and reliability of the application and data. The newly designed application for mitigating the presence of malware should make use of hash value and validation of the signature process. The native code should be executed on the android operating system for determining the presence of the malware in the source code of the application or not [10]. The development of the missed call generator helps in sending the alert to the user before using the application. For example, if the user fetch the audio or a video clip from the malware site than the automatic missed call or alert signal will be sent to the user smart phone and helps in informing the user not to make use of the malicious files. This helps in providing security to the user from the flow of malicious activities in his smart phone. The new software after sending the missed call for generating alerts asks the user to provide permission of accessing the data from the sharing of files. The new contacts of the user are added to the application for sending signals on the presence of malicious code in the source program of the application. The development of dynamic malware analysis system helps in managing the malware attacks which can take place on the IoT systems. The next generation of the technological advancement are the IoT applications which are developed for providing real time successful management of the requirement [11]. The increasing growth of the IoT environment will give rise to new malwares. The detection of the malware through the dynamic environment helps in initializing successful implementation of the data flow in the future working of the enterprise. The researchers should pay attention to the real time detector of the malware which can be based on the hash value integration system and signature based environment for managing the malware free resources in the next generation of the technological advancement [12]. The dynamic malware techniques helps in managing advanced malwares which can be developed in the coming future by the hackers due to the growth of intelligent system.
Conclusion
From the research and literature review, it can be concluded that the malwares are the major threat from the past, till present, and continues in the future for disrupting the flow of information and loss of data. The proactive preventive measures should be prepared which can minimise the effect of malware presence on the system of the user. The dynamic procedures for malware detection should be used for predicting the presence of malware in the source code. The algorithms should be based no hash value integration and signature validation and verification procedures. The inter-processing addressing system should be used measuring the occurrence of the vulnerabilities associated with the android operating system. The increasing demand of social media platforms opens door for hacking the information directly from the user account. It is required to develop security procedures for managing the botnets among the communication forum of customer to customers. The executable files of the processing units are used for analysing the intent and component associated with the potential malwares. The analysis of the control flow and data flow helps in finding the gaps for the data leakages during the development of the structure. The development of dynamic malware analysis system helps in managing the malware attacks which can take place on the IoT systems.
References
[1] S. Alam , Current trends and the future of metamorphic malware detection. 2014.
[2] B. Amro. Malware detection techniques for mobile devices. 2017.
[3] B. Amro, Personal mobile malware guard: A mobile malware detection techniques. 2018.
[4] C. Castillo, Android Malware past, present, and future. 2014.
[5] E. Erturk, A case study in open source software security and privacy: Android Adware. 2012.
[6] P. Gerland, Software Development: Past, Present, and future trends and tools. 2011.
[7] N. Huq, and N. Micro, The latest research on PoS malware. 2013.
[8] I. Muttik, Security mobile devices: Present and future. 2011.
[9] R. Raveendranath, R. Venkiteswaran, A. Babu, and S. Datta, Android malware attacks and countermeasures: Current and future direction. 2013.
[10] Security Blogger, Ransomware: Past, present, and future. 2016.
[11] M. Wagner, F. Fischer, R. Luh, A. Haberson, A. Rind, A. Keim, and W. Aigner, A survey of visualization systems for malware analysis. 2011.
[12] F. Wu, H. Narang, D. Clarke, An overview of mobile malware and solutions. 2014