Malware Incident Handling

A. Sankara Narayanan, M. Mohammed Ashik
2012 Proceedings of the International Conference on Advances in Computer Science and Electronics Engineering   unpublished
The paper will be a detailed introduction of malware handling for security professionals. This paper will also serve as a guideline for the reader to perform malware handling by providing definitions, tools to use, and real world demonstration to the reader with enough information to successfully perform malware incident handling. . It will spotlight on step by step process, including suggestions on what tool to employ, what to look for and what to do with the disbelieving file. In our
more » ... le. In our experiment we present the findings about the state of services, registry keys, security updates, and virus total results. Our analysis of the data demonstrates that malware detectors using tools and techniques.
doi:10.3850/978-981-07-1403-1_210 fatcat:zbz7lnanhnd3hc6mrhns2uql5i