Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

The Next Malware Battleground: Recovery After Unknown Infection

Published:01 May 2010Publication History
Skip Abstract Section

Abstract

Malware has become a natural aspect of Internet computing due to the imperfectness of systems that identify malware and prevent their installation. Our ability to control the volume of unwanted and malicious traffic on the Internet—the spam messages, the DoS attacks—hinges on our ability to not only prevent the initial installation of malware known to us but also to repair systems that unknown malware has successfully attacked. This article discusses techniques that identify and remove unknown infectious software.

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access