The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2010 vol.8)
pp: 74-76
Jon Giffin , Georgia Institute of Technology
ABSTRACT
Malware has become a natural aspect of Internet computing due to the imperfectness of systems that identify malware and prevent their installation. Our ability to control the volume of unwanted and malicious traffic on the Internet—the spam messages, the DoS attacks—hinges on our ability to not only prevent the initial installation of malware known to us but also to repair systems that unknown malware has successfully attacked. This article discusses techniques that identify and remove unknown infectious software.
INDEX TERMS
remediation, recovery, malware, security, bot, botnet
CITATION
Jon Giffin, "The Next Malware Battleground: Recovery After Unknown Infection", IEEE Security & Privacy, vol.8, no. 3, pp. 74-76, May/June 2010, doi:10.1109/MSP.2010.107
35 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool