The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - Apr. (2014 vol.47)
pp: 59-65
Ying-Dar Lin , National Chiao Tung University, Hsinchu
Chia-Yin Lee , National Chiao Tung University, Hsinchu
Yu-Sung Wu , National Chiao Tung University, Hsinchu
Pei-Hsiu Ho , National Chiao Tung University, Hsinchu
Fu-Yu Wang , National Chiao Tung University, Hsinchu
Yi-Lang Tsai , National Center for High-Performance Computing, Taiwan
ABSTRACT
An exploration of active and passive malware honeypots reveals that the two systems yield vastly different malware collections and that peer-to-peer file sharing is an important, but often overlooked, malware source.
INDEX TERMS
Databases, Virtual machining, Trojan horses, Peer-to-peer computing, Malware, Telecommunication traffic,network vulnerability, network security, honeypots, malware collection and detection
CITATION
Ying-Dar Lin, Chia-Yin Lee, Yu-Sung Wu, Pei-Hsiu Ho, Fu-Yu Wang, Yi-Lang Tsai, "Active versus Passive Malware Collection", Computer, vol.47, no. 4, pp. 59-65, Apr. 2014, doi:10.1109/MC.2013.226
5 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool