The next malware battleground: Recovery after unknown infection

被引:0
|
作者
Giffin J. [1 ]
机构
[1] Georgia Institute of Technology, United States
来源
IEEE Security and Privacy | 2010年 / 8卷 / 03期
关键词
Bot; Botnet; Malware; Recovery; Remediation; Security;
D O I
10.1109/MSP.2010.107
中图分类号
学科分类号
摘要
Malware has become a natural aspect of Internet computing due to the imperfectness of systems that identify malware and prevent their installation. Our ability to control the volume of unwanted and malicious traffic on the Internetthe spam messages, the DoS attackshinges on our ability to not only prevent the initial installation of malware known to us but also to repair systems that unknown malware has successfully attacked. This article discusses techniques that identify and remove unknown infectious software. © 2006 IEEE.
引用
收藏
页码:74 / 76
页数:2
相关论文
共 50 条
  • [21] Spearphishing Malware: Do We Really Know the Unknown?
    Baychev, Yanko
    Bilge, Leyla
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2018, 2018, 10885 : 46 - 66
  • [22] An unknown malware detection scheme based on the features of graph
    Zhao, Zongqu
    Wang, Junfeng
    Wang, Chonggang
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 239 - 246
  • [23] An Unknown Malware Detection Using Execution Registry Access
    Kono, Kento
    Phomkeona, Sanouphab
    Okamura, Koji
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 487 - 491
  • [24] Graph embedding as a new approach for unknown malware detection
    Hashemi H.
    Azmoodeh A.
    Hamzeh A.
    Hashemi S.
    Journal of Computer Virology and Hacking Techniques, 2017, 13 (3) : 153 - 166
  • [25] Semi-supervised Learning for Unknown Malware Detection
    Santos, Igor
    Nieves, Javier
    Bringas, Pablo G.
    INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, 2011, 91 : 415 - 422
  • [26] Heterogeneous Graph Matching Networks for Unknown Malware Detection
    Wang, Shen
    Chen, Zhengzhang
    Yu, Xiao
    Li, Ding
    Ni, Jingchao
    Tang, Lu-An
    Gui, Jiaping
    Li, Zhichun
    Chen, Haifeng
    Yu, Philip S.
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 3762 - 3770
  • [28] Towards the Automated Detection of Unknown Malware on Live Systems
    Pek, Gabor
    Buttyan, Levente
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 847 - 852
  • [29] Unknown Malware Detection Based on the Full Virtualization and SVM
    Zhao, Hengli
    Zheng, Ning
    Li, Jian
    Yao, Jingjing
    Hou, Qiang
    ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 473 - +
  • [30] An Opcode Sequences Analysis Method For Unknown Malware Detection
    Sun, Zhi
    Rao, Zhihong
    Chen, Jianfeng
    Xu, Rui
    He, Da
    Yang, Hui
    Liu, Jie
    2019 2ND INTERNATIONAL CONFERENCE ON GEOINFORMATICS AND DATA ANALYSIS (ICGDA 2019), 2019, : 15 - 19