The next malware battleground: Recovery after unknown infection

被引:0
|
作者
Giffin J. [1 ]
机构
[1] Georgia Institute of Technology, United States
来源
IEEE Security and Privacy | 2010年 / 8卷 / 03期
关键词
Bot; Botnet; Malware; Recovery; Remediation; Security;
D O I
10.1109/MSP.2010.107
中图分类号
学科分类号
摘要
Malware has become a natural aspect of Internet computing due to the imperfectness of systems that identify malware and prevent their installation. Our ability to control the volume of unwanted and malicious traffic on the Internetthe spam messages, the DoS attackshinges on our ability to not only prevent the initial installation of malware known to us but also to repair systems that unknown malware has successfully attacked. This article discusses techniques that identify and remove unknown infectious software. © 2006 IEEE.
引用
收藏
页码:74 / 76
页数:2
相关论文
共 50 条
  • [41] A survey on artificial intelligence in malware as next–generation threats
    Thanh C.T.
    Zelinka I.
    Mendel, 2019, 25 (02) : 27 - 34
  • [42] Topological protection from the next generation malware: a survey
    Arbore, Andrea
    Fioriti, Vincenzo Antonio
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2013, 9 (1-2) : 52 - 73
  • [44] Smartphone Malware Evolution Revisited: Android Next Target?
    Schmidt, Aubrey-Derrick
    Schmidt, Hans-Gunther
    Batyuk, Leonid
    Clausen, Jan Hendrik
    Camtepe, Seyit Ahmet
    Albayrak, Sahin
    Yildizli, Can
    2009 4TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2009), 2009, : 1 - +
  • [45] An Efficient Deep Unsupervised Domain Adaptation for Unknown Malware Detection
    Wang, Fangwei
    Chai, Guofang
    Li, Qingru
    Wang, Changguang
    SYMMETRY-BASEL, 2022, 14 (02):
  • [46] Entropy analysis to classify unknown packing algorithms for malware detection
    Munkhbayar Bat-Erdene
    Hyundo Park
    Hongzhe Li
    Heejo Lee
    Mahn-Soo Choi
    International Journal of Information Security, 2017, 16 : 227 - 248
  • [47] One-shot Learning Approach for Unknown Malware Classification
    Tran, Trung Kien
    Sato, Hiroshi
    Kubo, Masao
    PROCEEDINGS OF THE 2018 5TH ASIAN CONFERENCE ON DEFENSE TECHNOLOGY (ACDT 2018), 2018, : 8 - 13
  • [48] COUGAR: Clustering Of Unknown malware using Genetic Algorithm Routines
    Wilkins, Zachary
    Zincir-Heywood, Nur
    GECCO'20: PROCEEDINGS OF THE 2020 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2020, : 1195 - 1203
  • [49] Identifying Unknown Android Malware with Feature Extractions and Classification Techniques
    Apvrille, Ludovic
    Apvrilie, Axelle
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 182 - 189
  • [50] Entropy analysis to classify unknown packing algorithms for malware detection
    Bat-Erdene, Munkhbayar
    Park, Hyundo
    Li, Hongzhe
    Lee, Heejo
    Choi, Mahn-Soo
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (03) : 227 - 248