A Crowdsourcing Approach to Protect Against Novel Malware Threats

被引:0
|
作者
Christoforidis, Christoforos [1 ]
Vlachos, Vasileios [1 ]
Androulidakis, Iosif [2 ]
机构
[1] Technol Educ Inst Thessaly, Dept Comp Sci & Engn, Larisa, Greece
[2] Univ Ioannina, GR-45110 Ioannina, Greece
关键词
collaborative intelligence; JXTA; peer-to-peer; windows; worm protection;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Worm attacks for more than two decades have been affecting the Internet causing instability and economic loses. In a huge pool of possible victims such as the Internet there can exist many targets running the same software with the same vulnerabilities. To prevent such targets from getting infected one can use the crowd experience to identify a possible attack and restrict the use of possible vulnerable software for a certain period. Crowdsourcing intelligence or collaborative intelligence is the power of many when each one in a group of participants shares certain information. It is characterized by enhancing information accuracy which further improves decision making on the group. This paper presents and analyzes NetBuckler, a collaborative client application which employs collaborative intelligence to defend against Internet worms. It also briefly presents JXTA and its potential.
引用
下载
收藏
页码:1063 / 1066
页数:4
相关论文
共 50 条
  • [11] A novel approach for early malware detection
    Sharma, Anshul
    Singh, Sanjay Kumar
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (02)
  • [12] A Novel Approach to Detect Android Malware
    Almin, Shaikh Bushra
    Chatterjee, Madhumita
    INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 407 - 417
  • [13] Utilizing Computational Complexity to Protect Cryptocurrency Against Quantum Threats: A Review
    Gupta, Kishor Datta
    Rahman, Md. Lutfar
    Nag, Abhijit Kumar
    Mahmud, M. A. Parvez
    Sadman, Nafiz
    IT PROFESSIONAL, 2021, 23 (05) : 50 - 55
  • [14] Ethyl pyruvate: A novel approach to protect the fetus against antenatal inflammatory damage
    Kellert, Brian
    Stetson, Bethany T.
    Zhao, Guomao
    Guessas, Manel
    Buhimschi, Catalin S.
    Buhimschi, Irina A.
    AMERICAN JOURNAL OF OBSTETRICS AND GYNECOLOGY, 2018, 218 (01) : S355 - S356
  • [15] Mobile Banking: Evolution and Threats Malware threats and security solutions
    Wazid, Mohammad
    Zeadally, Sherali
    Das, Ashok Kumar
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2019, 8 (02) : 56 - 60
  • [16] Privacy in Crowdsourcing: a Review of the Threats and Challenges
    Xia, Huichuan
    McKernan, Brian
    COMPUTER SUPPORTED COOPERATIVE WORK-THE JOURNAL OF COLLABORATIVE COMPUTING AND WORK PRACTICES, 2020, 29 (03): : 263 - 301
  • [17] Malware characteristics and threats on the internet ecosystem
    Chen, Zhongqiang
    Roussopoulos, Mema
    Liang, Zhanyan
    Zhang, Yuan
    Chen, Zhongrong
    Delis, Alex
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (07) : 1650 - 1672
  • [18] Fighting malware and other unspeakable threats
    Gray, P
    INFORMATION SYSTEMS MANAGEMENT, 2005, 22 (02) : 91 - 95
  • [19] Privacy in Crowdsourcing: a Review of the Threats and Challenges
    Huichuan Xia
    Brian McKernan
    Computer Supported Cooperative Work (CSCW), 2020, 29 : 263 - 301
  • [20] Malware Target Recognition of Unknown Threats
    Dube, Thomas E.
    Raines, Richard A.
    Grimaila, Michael R.
    Bauer, Kenneth W.
    Rogers, Steven K.
    IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 467 - 477