2010 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery 2010
DOI: 10.1109/cyberc.2010.99
|View full text |Cite
|
Sign up to set email alerts
|

Retrospective detection of malware attacks by cloud computing

Abstract: As malware becomes pervasive and fast-evolving on the Internet, every computer linking to the outer world faces the risks of malware attacks. Therefore, it is important to not only detect malware as early as possible but also to determine which computer has been attacked. Among the various methods to find and trace the existence of malware, retrospective detection is promising one. Once a threat is identified, it allows one to determine exactly which host or users open similar files by searching historical inf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 3 publications
0
8
0
Order By: Relevance
“…Other widely used DDoS countermeasures are firewalls. However, due to firewall location (at the border of a network), it would not be able to detect distributed attacks once they are in the network [50].…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
“…Other widely used DDoS countermeasures are firewalls. However, due to firewall location (at the border of a network), it would not be able to detect distributed attacks once they are in the network [50].…”
Section: Denial Of Service Attacksmentioning
confidence: 99%
“…(2) Availability of toolkits that facilitate generation of new variants given a malware instance with the minimum programming experience [5], [11], (3) Attackers interest in exploiting the abundant strategies and tools created to protect programs and software developer's copyrights (e.g., Packing, and obfuscation) to evade the detection of their assaults. [6], (4) Funded organizations and forums to train novices and advanced attackers how to create attacks, exploit vulnerabilities in targeted victim's machine, and avoid detection mechanisms. Those and many other causes resulted in exponential increase in the number of newly created malware.…”
Section: Malware Industry Evolutionsmentioning
confidence: 99%
“…Signature can be the file name, the file size, the file digest or a combination of them. Sometimes it may be rule-based detection policy [6], [2]. The second solution is behaviour based systems.…”
Section: 1malware Attacks and Their Conventional Countermeasuresmentioning
confidence: 99%
See 2 more Smart Citations