The threat to identity from new and unknown malware

被引:0
|
作者
Hodgson, PW [1 ]
机构
[1] BT, Ipswich, Suffolk, England
关键词
D O I
10.1007/s10550-006-0012-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Malicious code in the form of computer viruses, worms, trojans and spam bots represents a most dangerous and costly threat to fully interconnected networked information systems. Infected Web pages can seriously compromise client machines and networks. Infected electronic messages, commonly sent in the form of e-mail viruses, may not only damage individual machines but may also cause serious denial of service damage by flooding networks. Socially engineered messages in the form of phishing attacks can cause a general lack of confidence in electronic commerce. Conventional approaches to these problems focus on identifying legitimate messages, which is not always an easy or obvious task. Validating the identity of an electronic communication is a fundamental problem in the modern wired world. The aim of this paper is to highlight the problem of authenticating the identity of electronic communications and to demonstrate an extra layer of protection with respect to e-mail systems, whereby attacks based upon the falsification of identity can be detected and eliminated with minimum impact on the system.
引用
收藏
页码:107 / 112
页数:6
相关论文
共 50 条
  • [21] NEW THREAT FROM CHLAMYDIA
    不详
    EMERGENCY MEDICINE, 1979, 11 (08) : 196 - 196
  • [22] THE NEW THREAT FROM PCBS
    YULSMAN, T
    SCIENCE DIGEST, 1985, 93 (02) : 66 - &
  • [23] NEW THREAT FROM POXVIRUSES
    Shah, Sonia
    SCIENTIFIC AMERICAN, 2013, 308 (03) : 66 - 71
  • [24] A NEW THREAT FROM THE EAST
    JOHNSTONE, B
    NEW SCIENTIST, 1986, 109 (1489) : 48 - 49
  • [25] Analyzing WhisperGate and BlackCat Malware: Methodology and Threat Perspective
    Nicho, Mathew
    Yadav, Rajesh
    Singh, Digvijay
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (04) : 504 - 519
  • [26] A Novel Information Fusion Model for Assessment of Malware Threat
    Dai, Chao
    Pang, Jianmin
    Zhang, Xiaochuan
    Liang, Guanghui
    Bai, Hong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 1 - 15
  • [27] Malware Threat Assessment Using Fuzzy Logic Paradigm
    Gandotra, Ekta
    Bansal, Divya
    Sofat, Sanjeev
    CYBERNETICS AND SYSTEMS, 2017, 48 (01) : 29 - 48
  • [28] Colluding Apps: Tomorrow's Mobile Malware Threat
    Memon, Atif M.
    Anwar, Ali
    IEEE SECURITY & PRIVACY, 2015, 13 (06) : 77 - 81
  • [29] An emerging threat Fileless malware: a survey and research challenges
    Sudhakar
    Kumar, Sushil
    CYBERSECURITY, 2020, 3 (01)
  • [30] Classification and Sharing Method of Malware Based on Threat Intelligence
    Liu, Guangyuan
    Zhou, Jiting
    Ma, Xiaoyu
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2203 - 2207