The threat to identity from new and unknown malware

被引:0
|
作者
Hodgson, PW [1 ]
机构
[1] BT, Ipswich, Suffolk, England
关键词
D O I
10.1007/s10550-006-0012-2
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Malicious code in the form of computer viruses, worms, trojans and spam bots represents a most dangerous and costly threat to fully interconnected networked information systems. Infected Web pages can seriously compromise client machines and networks. Infected electronic messages, commonly sent in the form of e-mail viruses, may not only damage individual machines but may also cause serious denial of service damage by flooding networks. Socially engineered messages in the form of phishing attacks can cause a general lack of confidence in electronic commerce. Conventional approaches to these problems focus on identifying legitimate messages, which is not always an easy or obvious task. Validating the identity of an electronic communication is a fundamental problem in the modern wired world. The aim of this paper is to highlight the problem of authenticating the identity of electronic communications and to demonstrate an extra layer of protection with respect to e-mail systems, whereby attacks based upon the falsification of identity can be detected and eliminated with minimum impact on the system.
引用
下载
收藏
页码:107 / 112
页数:6
相关论文
共 50 条
  • [41] Heterogeneous Graph Matching Networks for Unknown Malware Detection
    Wang, Shen
    Chen, Zhengzhang
    Yu, Xiao
    Li, Ding
    Ni, Jingchao
    Tang, Lu-An
    Gui, Jiaping
    Li, Zhichun
    Chen, Haifeng
    Yu, Philip S.
    PROCEEDINGS OF THE TWENTY-EIGHTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2019, : 3762 - 3770
  • [42] Towards the Automated Detection of Unknown Malware on Live Systems
    Pek, Gabor
    Buttyan, Levente
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 847 - 852
  • [43] Detecting Unknown Insider Threat Scenarios
    Young, William T.
    Memory, Alex
    Goldberg, Henry G.
    Senator, Ted E.
    2014 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW 2014), 2014, : 277 - 288
  • [44] Nasal Conidiobolomycosis- The Unknown Threat
    Arora, Nikhil
    Bhargava, Eishaan K.
    Rai, Varun
    JOURNAL OF CLINICAL AND DIAGNOSTIC RESEARCH, 2016, 10 (12) : MJ1 - MJ1
  • [45] Stereotype threat and identity threat: The science of a diverse community
    Steele, C. M.
    INTEGRATIVE AND COMPARATIVE BIOLOGY, 2021, 61 : E861 - E861
  • [46] Shades of threat: Racial identity as a moderator of stereotype threat
    Davis, Claytie, II
    Aronson, Joshua
    Salinas, Moises
    JOURNAL OF BLACK PSYCHOLOGY, 2006, 32 (04) : 399 - 417
  • [47] CARRENO,CAYETANO - IDENTITY AMID A MUSICAL GALAXY - (SOME NEW DATA FROM PREVIOUSLY UNKNOWN SOURCES)
    GIRARD, S
    LATIN AMERICAN MUSIC REVIEW-REVISTA DE MUSICA LATINOAMERICANA, 1980, 1 (01): : 18 - 33
  • [48] Unknown Malware Detection Based on the Full Virtualization and SVM
    Zhao, Hengli
    Zheng, Ning
    Li, Jian
    Yao, Jingjing
    Hou, Qiang
    ICMECG: 2009 INTERNATIONAL CONFERENCE ON MANAGEMENT OF E-COMMERCE AND E-GOVERNMENT, PROCEEDINGS, 2009, : 473 - +
  • [49] An Opcode Sequences Analysis Method For Unknown Malware Detection
    Sun, Zhi
    Rao, Zhihong
    Chen, Jianfeng
    Xu, Rui
    He, Da
    Yang, Hui
    Liu, Jie
    2019 2ND INTERNATIONAL CONFERENCE ON GEOINFORMATICS AND DATA ANALYSIS (ICGDA 2019), 2019, : 15 - 19
  • [50] IIoT Deep Malware Threat Hunting: From Adversarial Example Detection to Adversarial Scenario Detection
    Esmaeili, Bardia
    Azmoodeh, Amin
    Dehghantanha, Ali
    Karimipour, Hadis
    Zolfaghari, Behrouz
    Hammoudeh, Mohammad
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (12) : 8477 - 8486