Since any decades ago, malicious programs for Windows-located operating systems have happened a problem for the security manufacturing around the experience. The proliferation of embedded electronics and the Internet of Things, however, has extended dramatically along with concerning details advancement, that has caused a rapid shift in the malware surroundings. Embedded devices work on a different architecture than individual computers, that still primarily use x86 or x64 architectures, making them significantly distinct from personal calculatings in this regard. The surge in the exercise of Linux or its variant has forced hateful actors to present “Linux Malwares”. There is currently no systematic study trying to classify, judge, and comprehend Linux malware that we are fully alert of. The large portion of resources on the topic are meager reports, often written as blog posts, while the few orderly studies focused on the study of particular malware families (e.g., the Mirai botnet) generally through network-level behavior, leaving the main impediments of analyzing Linux malware unaddressed.
Author(s) Details:
Vikas Sharma,
Concordia University, Montreal, Quebec, Canada.
Please see the link here: https://stm.bookpi.org/RHMCS-V6/article/view/9680
Keywords: Linux malware, malicious programs, malware analysis, security