The Community for Technology Leaders
Green Image
Issue No. 03 - May/June (2010 vol. 8)
ISSN: 1540-7993
pp: 74-76
Jon Giffin , Georgia Institute of Technology
Malware has become a natural aspect of Internet computing due to the imperfectness of systems that identify malware and prevent their installation. Our ability to control the volume of unwanted and malicious traffic on the Internet—the spam messages, the DoS attacks—hinges on our ability to not only prevent the initial installation of malware known to us but also to repair systems that unknown malware has successfully attacked. This article discusses techniques that identify and remove unknown infectious software.
remediation, recovery, malware, security, bot, botnet
Jon Giffin, "The Next Malware Battleground: Recovery After Unknown Infection", IEEE Security & Privacy, vol. 8, no. , pp. 74-76, May/June 2010, doi:10.1109/MSP.2010.107
185 ms
(Ver 3.3 (11022016))