1,505 research outputs found

    Malware "Ecology" Viewed as Ecological Succession: Historical Trends and Future Prospects

    Full text link
    The development and evolution of malware including computer viruses, worms, and trojan horses, is shown to be closely analogous to the process of community succession long recognized in ecology. In particular, both changes in the overall environment by external disturbances, as well as, feedback effects from malware competition and antivirus coevolution have driven community succession and the development of different types of malware with varying modes of transmission and adaptability.Comment: 13 pages, 3 figure

    Safe Computing

    Get PDF
    So-called worms, viruses, and Trojan horses that attack computer systems are defined. The vehicle that allows these attacks to occur, namely, the open computer internetwork, is examined. The problem of providing protection against attack in an internetwork environment is discussed. The need for professional responsibility on the part of the scientific and engineering community in enforcing strong ethical practices and neither tolerating nor condoning such practices is stressed

    Securing library information system: Vulnerabilities and threats

    Get PDF
    Threats and vulnerabilities in computers and networks are common nowadays since computers are widely used by the public. The risks of computer threats and vulnerabilities are high since most computers are connected to the internet. Library Information Systems is also vulnerable to attack since it is a public access institution. Majority of users are naive when it comes to computer and network securities. Some breaches in Library Information System are intentional and some are unintentional. Risks analysis should be done to find the threats and risks in designing the Library Information System. Threats are made possible due to lack of proper procedures, software flaws and policies. The administrators should anticipate all the possible attacks and their mitigation techniques. In this paper, we will try to address various issues arise from this vulnerabilities and threats. We will also describe how we can reduce and overcome this vulnerabilities and threats

    Threats and countermeasures for network security

    Get PDF
    In the late 1980's, the traditional threat of anonymous break-ins to networked computers was joined by viruses and worms, multiplicative surrogates that carry out the bidding of their authors. Technologies for authentication and secrecy, supplemented by good management practices, are the principal countermeasures. Four articles on these subjects are presented

    What do “Back-to-School" Computers Have in Common with Health Education and Health Protection?

    Get PDF
    How to increase immunization levels in communities is a recurrent problem associated with missed opportunities. As communities gear-up for Back to School, health educators may encourage people to update their child, adolescent, and adult immunizations. Human herd immunity can protect communities from spread of infection, and an analogy is presented with “herd immunity for personal computers.” Both computer and biological viruses spread faster when a large portion of the population is unprotected. Just as individuals should receive immunization shots to protect self and families; computer systems can be protected against nasty computer code by using current anti-virus programs to limit the spread of viruses, worms, and Trojan horses from one computer to another. How much more would individuals rather receive timely shots that help to preserve health? An ounce of prevention is worth a pound of cure

    Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks

    Get PDF
    Malicious software is abundant in a world of innumerable computer users, who are constantly faced with these threats from various sources like the internet, local networks and portable drives. Malware is potentially low to high risk and can cause systems to function incorrectly, steal data and even crash. Malware may be executable or system library files in the form of viruses, worms, Trojans, all aimed at breaching the security of the system and compromising user privacy. Typically, anti-virus software is based on a signature definition system which keeps updating from the internet and thus keeping track of known viruses. While this may be sufficient for home-users, a security risk from a new virus could threaten an entire enterprise network. This paper proposes a new and more sophisticated antivirus engine that can not only scan files, but also build knowledge and detect files as potential viruses. This is done by extracting system API calls made by various normal and harmful executable, and using machine learning algorithms to classify and hence, rank files on a scale of security risk. While such a system is processor heavy, it is very effective when used centrally to protect an enterprise network which maybe more prone to such threats.Comment: 6 page

    A study on computer viruses attacks and the way to cure them / Shukor Sanim Mohd Fauzi

    Get PDF
    Many organizations and users are working hard to secure themselves from the growing threats of computer viruses, Trojan horses, worms, and other malicious codes. Computer viruses attacks are problems created by men or women and they are problems that can also be controlled by men or women. In the end, it is basically a war between virus writers and virus fighters. There are bright minds on both sides, and it looks like this fight is not going to end. This research intends to find the pattern of computer viruses attacks and perform a prediction on the next occurrence of virus. Other than that, this research also will propose a new way to cure from computer viruses attacks. The findings of this research are hope be able to shed some light for all of us
    corecore