The Community for Technology Leaders
Green Image
Issue No. 04 - Apr. (2014 vol. 47)
ISSN: 0018-9162
pp: 59-65
Ying-Dar Lin , National Chiao Tung University, Hsinchu
Chia-Yin Lee , National Chiao Tung University, Hsinchu
Yu-Sung Wu , National Chiao Tung University, Hsinchu
Pei-Hsiu Ho , National Chiao Tung University, Hsinchu
Fu-Yu Wang , National Chiao Tung University, Hsinchu
Yi-Lang Tsai , National Center for High-Performance Computing, Taiwan
ABSTRACT
An exploration of active and passive malware honeypots reveals that the two systems yield vastly different malware collections and that peer-to-peer file sharing is an important, but often overlooked, malware source.
INDEX TERMS
Databases, Virtual machining, Trojan horses, Peer-to-peer computing, Malware, Telecommunication traffic
CITATION

Y. Lin, C. Lee, Y. Wu, P. Ho, F. Wang and Y. Tsai, "Active versus Passive Malware Collection," in Computer, vol. 47, no. 4, pp. 59-65, 2014.
doi:10.1109/MC.2013.226
91 ms
(Ver 3.3 (11022016))