ABSTRACT

This chapter discusses the criminal business model of malware. Malware have the ability to infect, manipulate, and destroy computing devices and networks. Some types of malware are stealthy such that victims will not know when their devices are infected or when malware are actively causing damage to them. Programs that are classified as malware are essentially malicious programs that can cause damage or disruption to computers and their networks. The malware is aimed at infecting many machines, sometimes as many as 100,000, which it then uses in distributed denial-of-service attacks. The malware will download files for the malicious programs and copy them into directories on the hard disk of the victim from where they can be launched. The malware detection techniques vary in complexity and effectiveness. End-user security software is tasked with the responsibility of identifying malicious programs and files in the midst of many legitimate programs executing on a computer.