Assessing Real-time Malware Threats

被引:3
|
作者
Gander, Matthias [1 ]
Sauerwein, Clemens [1 ]
Breu, Ruth [1 ]
机构
[1] Univ Innsbruck, Inst Comp Sci, Innsbruck, Austria
关键词
Crowdsourcing; Information security; Monitoring;
D O I
10.1109/QRS-C.2015.14
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, distribution of malware has switched from classical channels, such as e-mail, vulnerable services, or macros in software, to a new channel, websites. Therefore one major entry point of malware - that severely reduces a user's security - is through the browser. For this reason it is essential to increase the security awareness of users and in the long-term extrapolate guidelines to decrease risk of browser-based malware infections. For this, a deeper understanding on how and how often an average user encounters malware is necessary. In this work we try to shed some light on this issue by proposing a prototypical, light-weight monitoring tool, dubbed Croft, that gathers freely given data, such as browsed URLs, workstation configuration, assumed computer skill level, occupation, gender, age, and antivirus alerts, from heterogeneous user groups in a crowdsourcing fashion.
引用
收藏
页码:6 / 13
页数:8
相关论文
共 50 条
  • [21] Efficient and Interpretable Real-Time Malware Detection Using Random-Forest
    Mills, Alan
    Spyridopoulos, Theodoros
    Legg, Phil
    [J]. 2019 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2019,
  • [22] Identification and Evaluation of Discriminative Lexical Features of Malware URL for Real-Time Classification
    Olalere, Morufu
    Abdullah, Mohd Taufik
    Mahmod, Ramlan
    Abdullah, Azizol
    [J]. PROCEEDINGS OF 6TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE 2016), 2016, : 90 - 95
  • [23] A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale
    Khoury, Joseph
    Pour, Morteza Safaei
    Bou-Harb, Elias
    [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
  • [24] Using side channel TCP features for real-time detection of malware connections
    Stergiopoulos, George
    Chronopoulou, Georgia
    Bitsikas, Evangelos
    Tsalis, Nikolaos
    Gritzalis, Dimitris
    [J]. JOURNAL OF COMPUTER SECURITY, 2019, 27 (05) : 507 - 520
  • [25] CredFinder: a Real-time Tweets Credibility Assessing System
    AlRubaian, Majed
    Al-Qurishi, Muhammad
    Al-Rakhami, Mabrook
    Hassan, Mohammad Mehedi
    Alamri, Atif
    [J]. PROCEEDINGS OF THE 2016 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING ASONAM 2016, 2016, : 1406 - 1409
  • [26] Assessing real-time Zika risk in the United States
    Castro, Lauren A.
    Fox, Spencer J.
    Chen, Xi
    Liu, Kai
    Bellan, Steven E.
    Dimitrov, Nedialko B.
    Galvani, Alison P.
    Meyers, Lauren Ancel
    [J]. BMC INFECTIOUS DISEASES, 2017, 17
  • [27] Role of real-time elastography in assessing the stage of thrombus
    Yi, Xiaolei
    Wei, Xuqian
    Wang, Yan
    Chen, Jie
    Li, Diancheng
    Hu, Bing
    [J]. INTERNATIONAL ANGIOLOGY, 2017, 36 (01) : 59 - 63
  • [28] ASSESSING THE IMPACT OF STRUCTURED REAL-TIME DESIGN METHODS
    EBERT, C
    [J]. JOURNAL OF MICROCOMPUTER APPLICATIONS, 1994, 17 (03): : 287 - 297
  • [29] Assessing real-time Zika risk in the United States
    Lauren A. Castro
    Spencer J. Fox
    Xi Chen
    Kai Liu
    Steven E. Bellan
    Nedialko B. Dimitrov
    Alison P. Galvani
    Lauren Ancel Meyers
    [J]. BMC Infectious Diseases, 17
  • [30] Assessing the reliability of different real-time optimization methodologies
    Fernando Mendoza, Diego
    Alves Graciano, Jose Eduardo
    Liporace, Fabio dos Santos
    Carrillo Le Roux, Galo Antonio
    [J]. CANADIAN JOURNAL OF CHEMICAL ENGINEERING, 2016, 94 (03): : 485 - 497