Proceedings of the 2008 New Security Paradigms Workshop 2008
DOI: 10.1145/1595676.1595692
|View full text |Cite
|
Sign up to set email alerts
|

The ecology of Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 19 publications
0
9
0
Order By: Relevance
“…For example, [53] is an empirical study of malware evolution. Arguments for employing nature-inspired technologies for cyber security that mention how biological and ecological systems use information to adapt in an unpredictable world include [34,45,60,85,114].…”
Section: Cyber Securitymentioning
confidence: 99%
“…For example, [53] is an empirical study of malware evolution. Arguments for employing nature-inspired technologies for cyber security that mention how biological and ecological systems use information to adapt in an unpredictable world include [34,45,60,85,114].…”
Section: Cyber Securitymentioning
confidence: 99%
“…Finally, the relationships and interactions between existing malware (so called malware ecology) have been investigated in [6]. Numbers of interactions, both accidental and intentional, between different types of malware were analyzed and the main conclusion was to seek ecologicallyinspired defense techniques, because many ideas from ecology can be directly applied to all aspects of malware defense.…”
Section: Bio-inspired Cybersecurity Inspired By Organisms' Interactionsmentioning
confidence: 99%
“…At the same time, the effectiveness of centrally-placed intrusion detection and prevention systems (IDS/IPS), which attempt to discover infected systems and attacks by monitoring the aggregate traffic of many end systems, continues to diminish with the growth in traffic volume, and with the increasing sophistication of malware and the botnets within which they operate [2,13]. Signature-based solutions will always lag behind the deployment of new malware variants and attempts at achieving zero-day detection and prevention of malware have had disappointing results.…”
Section: And Implemented As a Preprocessor Module For The Open Sourcementioning
confidence: 99%
“…Despite some success at take-down [11], it periodically resurfaces. This malware operates within Microsoft Windows* hosts which become infected with the worm through a variety of vectors ranging from port 445 attack to drive-by infection of vulnerable browsers [2]. Infected systems behind firewalls become slave nodes while those with full access to the Internet operate as relay nodes participating in the botnet's C&C relay structure.…”
Section: Detailed Example: Nobot Detection Of the W32waledac Wormmentioning
confidence: 99%