The threat to identity from new and unknown malware

被引:0
|
作者
Hodgson, PW [1 ]
机构
[1] BT, Ipswich, Suffolk, England
关键词
D O I
10.1007/s10550-006-0012-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Malicious code in the form of computer viruses, worms, trojans and spam bots represents a most dangerous and costly threat to fully interconnected networked information systems. Infected Web pages can seriously compromise client machines and networks. Infected electronic messages, commonly sent in the form of e-mail viruses, may not only damage individual machines but may also cause serious denial of service damage by flooding networks. Socially engineered messages in the form of phishing attacks can cause a general lack of confidence in electronic commerce. Conventional approaches to these problems focus on identifying legitimate messages, which is not always an easy or obvious task. Validating the identity of an electronic communication is a fundamental problem in the modern wired world. The aim of this paper is to highlight the problem of authenticating the identity of electronic communications and to demonstrate an extra layer of protection with respect to e-mail systems, whereby attacks based upon the falsification of identity can be detected and eliminated with minimum impact on the system.
引用
收藏
页码:107 / 112
页数:6
相关论文
共 50 条
  • [31] An emerging threat Fileless malware: a survey and research challenges
    Sushil Sudhakar
    Cybersecurity, 3
  • [32] GPThreats-3: Is Automatic Malware Generation a Threat?
    Botacin, Marcus
    2023 IEEE SECURITY AND PRIVACY WORKSHOPS, SPW, 2023, : 238 - 254
  • [33] A Threat Model Method for ICS Malware: the TRISIS case
    Mekdad, Yassine
    Bernieri, Giuseppe
    Conti, Mauro
    El Fergougui, Abdeslam
    PROCEEDINGS OF THE 18TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2021 (CF 2021), 2021, : 221 - 228
  • [34] A CASE OF UNKNOWN IDENTITY
    SNYDERS, J
    INFOSYSTEMS, 1987, 34 (10): : 54 - +
  • [35] Unknown Malware Detection Using Network Traffic Classification
    Bekerman, Dmitri
    Shapira, Bracha
    Rokach, Lior
    Bar, Ariel
    2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 134 - 142
  • [36] The next malware battleground: Recovery after unknown infection
    Giffin J.
    IEEE Security and Privacy, 2010, 8 (03): : 74 - 76
  • [37] Spearphishing Malware: Do We Really Know the Unknown?
    Baychev, Yanko
    Bilge, Leyla
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2018, 2018, 10885 : 46 - 66
  • [38] An unknown malware detection scheme based on the features of graph
    Zhao, Zongqu
    Wang, Junfeng
    Wang, Chonggang
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 239 - 246
  • [39] An Unknown Malware Detection Using Execution Registry Access
    Kono, Kento
    Phomkeona, Sanouphab
    Okamura, Koji
    2018 IEEE 42ND ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC 2018), VOL 2, 2018, : 487 - 491
  • [40] Semi-supervised Learning for Unknown Malware Detection
    Santos, Igor
    Nieves, Javier
    Bringas, Pablo G.
    INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND ARTIFICIAL INTELLIGENCE, 2011, 91 : 415 - 422