Explore chapters and articles related to this topic
Cyber-Espionage Malware Attacks Detection and Analysis: A Case Study
Published in Journal of Computer Information Systems, 2022
Ilker Kara
In this study, the analysis of volatile memory allows the detection of malware by only examining the states in the system memory. In addition, another important advantage is that the analysis allows the examination of fileless malicious software, which leaves no traces on the hard disk.14 The new generation of fileless malware runs in the victim’s system memory or survives until shutting down the system. Thus, fileless malware detection is almost impossible for typical signature-based anti-virus programs.