Malware as a Component in Cybercrime: A Survey
Main Article Content
Abstract
In today’s world, we face a lot of trouble due to cybercrimes, where every individual is a potential victim knowingly or unknowingly. One of the main components in cybercrime is malware, which can be used effectively to launch attacks. This paper presents a survey of the various types of malwares that are commonly used and how they exploit the cyber world through cybercrime.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
: Current State of Cybercrime, RSA whitepaper.
Uppall, D., Mehra, V., & Verma, V. Basic survey on Malware Analysis, Tools, and Techniques.
Yang, Z. A survey of cybercrime.
Singla, S. Detecting and Classifying Morphed Malwares: A Survey.
Suarez-Tangil, G., Tapiador, J. E., Peris-Lopez, P., & Ribagorda, A. Evolution, Detection and Analysis of Malware for Smart Devices.
Mathur, K. A Survey on Techniques in Detection and Analyzing Malware Executables.
Raj, R. A., Gandotra, E., Bansal, D., & Sofat, S. Malware Analysis and Classification: A Survey. International Journal of Computer Engineering In Research Trends, 4(5), 176-179, May - 2017.
House of Commons, Science and Technology Committee. Malware and cyber crime.
Landage, J. Malware and Malware Detection Techniques: A Survey.
Kireet, & Dr.Meda, & Sreenivasa Rao. A Survey on Malware Attacks on Smartphones.
The Guardian. Cyber attack: Hackers 'weaponised' everyday devices with malware to mount assault.
Securelist. IT Threat Evolution in Q2 2016 Statistics.
AV-TEST. Malware Statistics.
Barkly Blog. Cyber Security Statistics 2017.