A Crowdsourcing Approach to Protect Against Novel Malware Threats

被引:0
|
作者
Christoforidis, Christoforos [1 ]
Vlachos, Vasileios [1 ]
Androulidakis, Iosif [2 ]
机构
[1] Technol Educ Inst Thessaly, Dept Comp Sci & Engn, Larisa, Greece
[2] Univ Ioannina, GR-45110 Ioannina, Greece
关键词
collaborative intelligence; JXTA; peer-to-peer; windows; worm protection;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Worm attacks for more than two decades have been affecting the Internet causing instability and economic loses. In a huge pool of possible victims such as the Internet there can exist many targets running the same software with the same vulnerabilities. To prevent such targets from getting infected one can use the crowd experience to identify a possible attack and restrict the use of possible vulnerable software for a certain period. Crowdsourcing intelligence or collaborative intelligence is the power of many when each one in a group of participants shares certain information. It is characterized by enhancing information accuracy which further improves decision making on the group. This paper presents and analyzes NetBuckler, a collaborative client application which employs collaborative intelligence to defend against Internet worms. It also briefly presents JXTA and its potential.
引用
下载
收藏
页码:1063 / 1066
页数:4
相关论文
共 50 条
  • [1] Improving the Android Smartphone Security against Various Malware Threats
    Hrestak, Darko
    Picek, Stjepan
    Rumenjak, Zeljko
    2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1290 - 1295
  • [2] Securing Wireless Sensor Network Against Multi-Malware Threats: A Comprehensive Modeling and Analysis Approach
    Jyoti Mishra
    Pramod Kumar Srivastava
    Vineet Srivastava
    SN Computer Science, 6 (3)
  • [3] Disruptive Innovations to Help Protect against Future Threats
    Wong, Ernest Y.
    Sambaluk, Nicholas M.
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), 2016, : 155 - 159
  • [4] Texas professionals are employing a one health approach to protect the United States against biosecurity threats
    Dacso, Matthew M.
    Bente, Dennis A.
    Weaver, Scott C.
    Kobinger, Gary P.
    Melby, Peter C.
    McLellan, Susan L. F.
    Keiser, Philip H.
    Hamer, Sarah A.
    Hamer, Gabriel L.
    Parker Jr, Gerald W.
    Douphrate, David I.
    Rodriguez, Anabel
    Goodman, Michael L.
    Ara, X., III
    Gray, Gregory C.
    ONE HEALTH, 2022, 15
  • [5] A Mitigation Approach to the Privacy and Malware Threats of Social Network Services
    Mohtasebi, SeyedHossein
    Dehghantanha, Ali
    DIGITAL INFORMATION PROCESSING AND COMMUNICATIONS, PT 2, 2011, 189 : 448 - 459
  • [6] A Formal Concept Analysis approach to hierarchical description of malware threats
    Ojeda-Hernandez, Manuel
    Lopez-Rodriguez, Domingo
    Mora, Angel
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2024, 50
  • [7] Intestinal epithelial defense systems protect against bacterial threats
    Hurley B.P.
    McCormick B.A.
    Current Gastroenterology Reports, 2004, 6 (5) : 355 - 361
  • [8] Internet threats and ways to protect against them: A brief review
    Mambetov, Saken
    Begimbayeva, Yenlik
    Joldasbayev, Serik
    Kazbekova, Gulnur
    Proceedings of the 13th International Conference on Cloud Computing, Data Science and Engineering, Confluence 2023, 2023, : 195 - 198
  • [9] EsPADA: Enhanced Payload Analyzer for malware Detection robust against Adversarial threats
    Maestre Vidal, Jorge
    Sotelo Monge, Marco Antonio
    Martinez Monterrubio, Sergio Mauricio
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 104 : 159 - 173
  • [10] Securing IMS Against Novel Threats
    Wahl, Stefan
    Rieck, Konrad
    Laskov, Pavel
    Domschitz, Peter
    Mueller, Klaus-Robert
    BELL LABS TECHNICAL JOURNAL, 2009, 14 (01) : 243 - 257