Issue No. 03 - May/June (2010 vol. 8)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2010.107
Jon Giffin , Georgia Institute of Technology
Malware has become a natural aspect of Internet computing due to the imperfectness of systems that identify malware and prevent their installation. Our ability to control the volume of unwanted and malicious traffic on the Internet—the spam messages, the DoS attacks—hinges on our ability to not only prevent the initial installation of malware known to us but also to repair systems that unknown malware has successfully attacked. This article discusses techniques that identify and remove unknown infectious software.
remediation, recovery, malware, security, bot, botnet
Jon Giffin, "The Next Malware Battleground: Recovery After Unknown Infection", IEEE Security & Privacy, vol. 8, no. , pp. 74-76, May/June 2010, doi:10.1109/MSP.2010.107