The next malware battleground: Recovery after unknown infection

被引:0
|
作者
Giffin J. [1 ]
机构
[1] Georgia Institute of Technology, United States
来源
IEEE Security and Privacy | 2010年 / 8卷 / 03期
关键词
Bot; Botnet; Malware; Recovery; Remediation; Security;
D O I
10.1109/MSP.2010.107
中图分类号
学科分类号
摘要
Malware has become a natural aspect of Internet computing due to the imperfectness of systems that identify malware and prevent their installation. Our ability to control the volume of unwanted and malicious traffic on the Internetthe spam messages, the DoS attackshinges on our ability to not only prevent the initial installation of malware known to us but also to repair systems that unknown malware has successfully attacked. This article discusses techniques that identify and remove unknown infectious software. © 2006 IEEE.
引用
收藏
页码:74 / 76
页数:2
相关论文
共 50 条
  • [31] Will Acupuncture Be the Next Addition to Enhanced Recovery After Surgery Protocols
    Ljungqvist, Olle
    de Boer, Hans D.
    JAMA SURGERY, 2023, 158 (01) : 28 - 28
  • [32] Functional recovery after partial nephrectomy: next generation analysis
    Munoz-Lopez, Carlos
    Lewis, Kieran
    Attawettayanon, Worapat
    Yasuda, Yosuke
    Accioly, Joao Pedro Emrich
    Rathi, Nityam
    Lone, Zaeem
    Boumitri, Melissa
    Campbell, Rebecca A.
    Wood, Andrew
    Kaouk, Jihad H.
    Haber, Georges-Pascal
    Eltemamy, Mohamad
    Krishnamurthi, Venkatesh
    Abouassaly, Robert
    Haywood, Samuel C.
    Weight, Christopher J.
    Campbell, Steven C.
    BJU INTERNATIONAL, 2023, 132 (02) : 202 - 209
  • [33] What's next after COVID-19 recovery?
    Boglione, Lucio
    JOURNAL OF PUBLIC HEALTH AND EMERGENCY, 2023, 7
  • [34] Immune recovery after hibernation and HIV infection
    Monica Harrington
    Lab Animal, 2013, 42 : 39 - 39
  • [35] Immune recovery after hibernation and HIV infection
    Harrington, Monica
    LAB ANIMAL, 2013, 42 (02) : 39 - 39
  • [36] Branded drug reformulation: The next brand vs. generic antitrust battleground
    Amoresano, Guy V.
    FOOD AND DRUG LAW JOURNAL, 2007, 62 (01) : 249 - 256
  • [37] A few-shot malware classification approach for unknown family recognition using malware feature visualization
    Conti, Mauro
    Khandhar, Shubham
    Vinod, P.
    Computers and Security, 2022, 122
  • [38] A few-shot malware classification approach for unknown family recognition using malware feature visualization
    Conti, Mauro
    Khandhar, Shubham
    Vinod, P.
    COMPUTERS & SECURITY, 2022, 122
  • [39] Drug wars in the post-Gutenberg galaxy: mass media as the next battleground
    Proctor, D
    Babor, TF
    ADDICTION, 2001, 96 (03) : 377 - 381
  • [40] Early Malware Detection and Next-Action Prediction
    Jamadi, Zahra
    Aghdam, Amir G.
    2023 IEEE 13TH INTERNATIONAL CONFERENCE ON RFID TECHNOLOGY AND APPLICATIONS, RFID-TA, 2023, : 111 - 114