DocumentCode :
2787
Title :
Active versus Passive Malware Collection
Author :
Ying-Dar Lin ; Chia-Yin Lee ; Yu-Sung Wu ; Pei-Hsiu Ho ; Fu-yu Wang ; Yi-Lang Tsai
Volume :
47
Issue :
4
fYear :
2014
fDate :
Apr. 2014
Firstpage :
59
Lastpage :
65
Abstract :
An exploration of active and passive malware honeypots reveals that the two systems yield vastly different malware collections and that peer-to-peer file sharing is an important, but often overlooked, malware source.
Keywords :
invasive software; peer-to-peer computing; active malware collection; active malware honeypots; passive malware collection; passive malware honeypots; peer-to-peer file sharing; Databases; Malware; Peer-to-peer computing; Telecommunication traffic; Trojan horses; Virtual machining; honeypots; malware collection and detection; network security; network vulnerability;
fLanguage :
English
Journal_Title :
Computer
Publisher :
ieee
ISSN :
0018-9162
Type :
jour
DOI :
10.1109/MC.2013.226
Filename :
6544525
Link To Document :
بازگشت