A. O. Eboka

Work place: Department of Computer Education, Federal College of Education (Technical), Asaba, Delta State, Nigeria.

E-mail:

Website:

Research Interests: Data Structures, Data Structures and Algorithms, Network Security, Information Security, Ubiquitous Computing

Biography

Andrew O. Eboka `received his HND in Computer Science from Akanu Ibiam Federal Polytechnic in the year 1998, Ebonyi State, PGD from Ebonyi State University in 2013, BSc/Ed in Computer Science Education from the Enugu State University of Science and Technology, Enugu in 2013. He received his MSc in Network Computing from Coventry University, United Kingdom. He currently lectures with the Department of Computer Science Education at Federal College of Education (Technical), Asaba, Delta State, Nigeria. His research interests include: Network Security and Management, CyberSecurity, Ubiquitous Computing, Data Security and Forensics. He is a member of: The British Computer Society and Association of Computer Machinery.

Author Articles
Signature-Based Malware Detection Using Approximate Boyer Moore String Matching Algorithm

By A. Ojugoa A. O. Eboka

DOI: https://doi.org/10.5815/ijmsc.2019.03.05, Pub. Date: 8 Jul. 2019

Adversaries to any system restlessly continues to sought effective, non-detectable means to aid them successful penetrate secure systems, either for fun or commercial gains. They achieve these feats easily through the use of malware, which keeps on the rise, an ever-growing and corresponding overpopulated malware zoo. As such, information technology industry will continue to encounter via these escapades, both monetary and prestigious losses. Malware by design aims to alter the behaviour of its host by self-replicating its genome or codes unto it. They are quite fascinating in that on execution, some malware change their own structure so that its copies have same functionality but differ in signature and syntax from the original or parent virus. This makes signature detection quite unreliable. Study investigates detection of metamorphic malware attacks using the Boyer Moore algorithm for string-based signature detection scheme.

[...] Read more.
Other Articles