The threat to identity from new and unknown malware

被引:0
|
作者
Hodgson, PW [1 ]
机构
[1] BT, Ipswich, Suffolk, England
关键词
D O I
10.1007/s10550-006-0012-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Malicious code in the form of computer viruses, worms, trojans and spam bots represents a most dangerous and costly threat to fully interconnected networked information systems. Infected Web pages can seriously compromise client machines and networks. Infected electronic messages, commonly sent in the form of e-mail viruses, may not only damage individual machines but may also cause serious denial of service damage by flooding networks. Socially engineered messages in the form of phishing attacks can cause a general lack of confidence in electronic commerce. Conventional approaches to these problems focus on identifying legitimate messages, which is not always an easy or obvious task. Validating the identity of an electronic communication is a fundamental problem in the modern wired world. The aim of this paper is to highlight the problem of authenticating the identity of electronic communications and to demonstrate an extra layer of protection with respect to e-mail systems, whereby attacks based upon the falsification of identity can be detected and eliminated with minimum impact on the system.
引用
下载
收藏
页码:107 / 112
页数:6
相关论文
共 50 条
  • [1] Automatic Generation of Malware Threat Intelligence from Unstructured Malware Traces
    Wei, Yuheng
    Zou, Futai
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 44 - 61
  • [2] Graph embedding as a new approach for unknown malware detection
    Hashemi H.
    Azmoodeh A.
    Hamzeh A.
    Hashemi S.
    Journal of Computer Virology and Hacking Techniques, 2017, 13 (3) : 153 - 166
  • [3] Mobile Device Threat: Malware
    Atanassov, Nikolay
    Chowdhury, Md Minhaz
    2021 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2021, : 7 - 13
  • [4] Sizing up the malware threat - key malware trends for 2010
    Cluley G.
    Network Security, 2010, 2010 (04) : 8 - 10
  • [5] The Caregiver Identity in Context: Consequences of Identity Threat From Siblings
    Rurka, Marissa
    Suitor, J. Jill
    Gilligan, Megan
    JOURNALS OF GERONTOLOGY SERIES B-PSYCHOLOGICAL SCIENCES AND SOCIAL SCIENCES, 2021, 76 (08): : 1593 - 1604
  • [6] Threat assessment model for mobile malware
    v Do, Thanh
    Lyche, Fredrik B.
    Lytskjold, Jørgen H.
    van Thuan, Do
    Lecture Notes in Electrical Engineering, 2015, 339 : 467 - 474
  • [7] THE CAREGIVER IDENTITY IN CONTEXT: CONSEQUENCES OF IDENTITY THREAT FROM SIBLINGS
    Rurka, Marissa
    Suitor, J. Jill
    Gilligan, Megan
    INNOVATION IN AGING, 2022, 6 : 295 - 295
  • [8] Unknown malware detection based on IRP
    Zhang F.-Y.
    Qi D.-Y.
    Hu J.-L.
    Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2011, 39 (04): : 15 - 20
  • [9] Malware Target Recognition of Unknown Threats
    Dube, Thomas E.
    Raines, Richard A.
    Grimaila, Michael R.
    Bauer, Kenneth W.
    Rogers, Steven K.
    IEEE SYSTEMS JOURNAL, 2013, 7 (03): : 467 - 477
  • [10] MaITRAK: Tracking and Eliminating Unknown Malware
    Vasudevan, Amit
    24TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2008, : 311 - 321