DocumentCode
2787
Title
Active versus Passive Malware Collection
Author
Ying-Dar Lin ; Chia-Yin Lee ; Yu-Sung Wu ; Pei-Hsiu Ho ; Fu-yu Wang ; Yi-Lang Tsai
Volume
47
Issue
4
fYear
2014
fDate
Apr. 2014
Firstpage
59
Lastpage
65
Abstract
An exploration of active and passive malware honeypots reveals that the two systems yield vastly different malware collections and that peer-to-peer file sharing is an important, but often overlooked, malware source.
Keywords
invasive software; peer-to-peer computing; active malware collection; active malware honeypots; passive malware collection; passive malware honeypots; peer-to-peer file sharing; Databases; Malware; Peer-to-peer computing; Telecommunication traffic; Trojan horses; Virtual machining; honeypots; malware collection and detection; network security; network vulnerability;
fLanguage
English
Journal_Title
Computer
Publisher
ieee
ISSN
0018-9162
Type
jour
DOI
10.1109/MC.2013.226
Filename
6544525
Link To Document