<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2d1 20170631//EN" "JATS-journalpublishing1.dtd">
<article xlink="http://www.w3.org/1999/xlink" dtd-version="1.0" article-type="technology" lang="en"><front><journal-meta><journal-id journal-id-type="publisher">IJCRR</journal-id><journal-id journal-id-type="nlm-ta">I Journ Cur Res Re</journal-id><journal-title-group><journal-title>International Journal of Current Research and Review</journal-title><abbrev-journal-title abbrev-type="pubmed">I Journ Cur Res Re</abbrev-journal-title></journal-title-group><issn pub-type="ppub">2231-2196</issn><issn pub-type="opub">0975-5241</issn><publisher><publisher-name>Radiance Research Academy</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">1133</article-id><article-id pub-id-type="doi"/><article-id pub-id-type="doi-url"/><article-categories><subj-group subj-group-type="heading"><subject>Technology</subject></subj-group></article-categories><title-group><article-title>A LITERATURE REVIEW ON MALWARE AND ITS ANALYSIS&#13;
</article-title></title-group><contrib-group><contrib contrib-type="author"><name><surname>Verma</surname><given-names>Aparna</given-names></name></contrib><contrib contrib-type="author"><name><surname>M.S.Rao</surname><given-names/></name></contrib><contrib contrib-type="author"><name><surname>A.K.Gupta</surname><given-names/></name></contrib><contrib contrib-type="author"><name><surname>Jeberson</surname><given-names>W.</given-names></name></contrib><contrib contrib-type="author"><name><surname>Singh</surname><given-names>Vrijendra</given-names></name></contrib></contrib-group><pub-date pub-type="ppub"><day>28</day><month>08</month><year>2013</year></pub-date><volume>)</volume><issue/><fpage>71</fpage><lpage>82</lpage><permissions><copyright-statement>This article is copyright of Popeye Publishing, 2009</copyright-statement><copyright-year>2009</copyright-year><license license-type="open-access" href="http://creativecommons.org/licenses/by/4.0/"><license-p>This is an open-access article distributed under the terms of the Creative Commons Attribution (CC BY 4.0) Licence. You may share and adapt the material, but must give appropriate credit to the source, provide a link to the licence, and indicate if changes were made.</license-p></license></permissions><abstract><p>Malwares are nasty software‘s .It is designed to damage computer systems without the knowledge of the owner using the system and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available literatures on malware analysis and to determine how research has evolved and advanced in terms of quantity, content and publication outlets. Most malware programs are large and complex and one can‘t possibly understand every detail. Educating the internet users about malware attack, as well as the implementation and proper application of anti-malware tools, are critical steps in protecting the identities of online consumers against malware attacks.&#13;
</p></abstract><kwd-group><kwd>Malware</kwd><kwd> Internet</kwd><kwd> malware attack</kwd><kwd> forensic analysis</kwd><kwd> anti-malware tools</kwd></kwd-group></article-meta></front></article>
