This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Next Malware Battleground: Recovery After Unknown Infection
May/June 2010 (vol. 8 no. 3)
pp. 74-76
Jon Giffin, Georgia Institute of Technology
Malware has become a natural aspect of Internet computing due to the imperfectness of systems that identify malware and prevent their installation. Our ability to control the volume of unwanted and malicious traffic on the Internet—the spam messages, the DoS attacks—hinges on our ability to not only prevent the initial installation of malware known to us but also to repair systems that unknown malware has successfully attacked. This article discusses techniques that identify and remove unknown infectious software.
Index Terms:
remediation, recovery, malware, security, bot, botnet
Citation:
Jon Giffin, "The Next Malware Battleground: Recovery After Unknown Infection," IEEE Security & Privacy, vol. 8, no. 3, pp. 74-76, May-June 2010, doi:10.1109/MSP.2010.107
Usage of this product signifies your acceptance of the Terms of Use.