Assessing Real-time Malware Threats

被引:3
|
作者
Gander, Matthias [1 ]
Sauerwein, Clemens [1 ]
Breu, Ruth [1 ]
机构
[1] Univ Innsbruck, Inst Comp Sci, Innsbruck, Austria
关键词
Crowdsourcing; Information security; Monitoring;
D O I
10.1109/QRS-C.2015.14
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, distribution of malware has switched from classical channels, such as e-mail, vulnerable services, or macros in software, to a new channel, websites. Therefore one major entry point of malware - that severely reduces a user's security - is through the browser. For this reason it is essential to increase the security awareness of users and in the long-term extrapolate guidelines to decrease risk of browser-based malware infections. For this, a deeper understanding on how and how often an average user encounters malware is necessary. In this work we try to shed some light on this issue by proposing a prototypical, light-weight monitoring tool, dubbed Croft, that gathers freely given data, such as browsed URLs, workstation configuration, assumed computer skill level, occupation, gender, age, and antivirus alerts, from heterogeneous user groups in a crowdsourcing fashion.
引用
收藏
页码:6 / 13
页数:8
相关论文
共 50 条
  • [1] Twitter Analysis for Real-Time Malware Discovery
    Concone, Federico
    De Paola, Alessandra
    Lo Re, Giuseppe
    Morana, Marco
    [J]. 2017 AEIT INTERNATIONAL ANNUAL CONFERENCE, 2017,
  • [2] A framework for metamorphic malware analysis and real-time detection
    Alam, Shahid
    Horspool, R. Nigel
    Traore, Issa
    Sogukpinar, Ibrahim
    [J]. COMPUTERS & SECURITY, 2015, 48 : 212 - 233
  • [3] Magnetic localization and real-time tracking of concealed threats
    Perry, AR
    Czipott, PV
    Dalichaouch, Y
    Walsh, D
    [J]. SUBSURFACE AND SURFACE SENSING TECHNOLOGIES AND APPLICATIONS III, 2001, 4491 : 167 - 173
  • [4] A Real-time Path Planning Method for Emergent Threats
    Ding Zejun
    Zhang Jian
    Li Chaoxu
    Liu Yukun
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, 2015, : 3014 - 3019
  • [5] Self-Attentive Models for Real-Time Malware Classification
    Lu, Qikai
    Zhang, Hongwen
    Kinawi, Husam
    Niu, Di
    [J]. IEEE ACCESS, 2022, 10 : 95970 - 95985
  • [6] Real-Time Malware Process Detection and Automated Process Killing
    Rhode, Matilda
    Burnap, Pete
    Wedgbury, Adam
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [7] MARD: A Framework for Metamorphic Malware Analysis and Real-Time Detection
    Alam, Shahid
    Horspool, R. Nigel
    Traore, Issa
    [J]. 2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 480 - 489
  • [8] Learning Fast and Slow: Propedeutica for Real-Time Malware Detection
    Sun, Ruimin
    Yuan, Xiaoyong
    He, Pan
    Zhu, Qile
    Chen, Aokun
    Gregio, Andre
    Oliveira, Daniela
    Li, Xiaolin
    [J]. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 33 (06) : 2518 - 2529
  • [9] Real-time ambulance relocation: Assessing real-time redeployment strategies for ambulance relocation
    van Barneveld, Thije
    Jagtenberg, Caroline
    Bhulai, Sandjai
    van der Mei, Rob
    [J]. SOCIO-ECONOMIC PLANNING SCIENCES, 2018, 62 : 129 - 142
  • [10] Threats to Information Security of Real-Time Disease Surveillance Systems
    Henriksen, Eva
    Johansen, Monika A.
    Baardsgaard, Anders
    Bellika, Johan G.
    [J]. MEDICAL INFORMATICS IN A UNITED AND HEALTHY EUROPE, 2009, 150 : 710 - 714