Abstract
The wide spread of Internet in addition to the wide range of applications that use it, has opened new realms for the virus creators. As a result, during the past years, the dangers that computer viruses are exposing users are becoming more and more serious. In addition we do not have only computer viruses, but a big family of malicious software, which is spreading in range and numbers. The targets that most of these malware have is depicted in table 1.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Symantec, http://www.symantec.com
F-Secure, http://www.f-secure.com
Sophos, http://www.sophos.com
Constantinos, P., Nikolaos, A.: Torrent worms. In: 8th Joint Conference on Knowledge - Based Software Engineering, JCKBSE 2008, University of Piraeus, August 25 -28 (2008)
Patsakis, C., Asthenidis, A., Chatzidimitriou, A.: Social networks as an attack platform: Facebook case study. In: Eighth International Conference on Networks, ICN 2009, Gosier, Guadeloupe, France, March 1 - 6 (2009)
Constantinos, P., Nikolaos, A.: New malicious agents and SK virii. In: International Multi-Conference on Computing in the Global Information Technology, ICCGI 2007, Guadeloupe, France (2007)
Panda labs, http://www.pandalabs.com
Szor, P.: The Art of Computer Virus Research and Defence. Addison-Wesley Professional, Reading (2005)
Provos, N., McClain, J., Wang, K.: Search Worms. In: Proceedings of the 4th ACM Workshop on Recurring Malcode, WORM 2006, pp. 1–8 (2006)
Long, J.: Google Hacking For Penetration Testers, vol. 1, Syngress (2005)
Long, J.: Google Hacking For Penetration Testers, vol. 2, Syngress (2005)
Weizenbaum, J.: ELIZA - A Computer Program For the Study of Natural Language Communication Between Man And Machine. Communications of the ACM 9(1), 36–45 (1966)
Elbot, http://www.elbot.com/
SCIgen - An Automatic CS Paper Generator, http://pdos.csail.mit.edu/scigen/
Facebook, http://www.facebook.com
Nielsen Net Ratings, http://www.nielsennetratings.com/
Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K.G., Markatos, E.P.: Antisocial Networks: Turning a Social Network into a Botnet. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 146–160. Springer, Heidelberg (2008)
Patsakis, C., Asthenidis, A., Chatzidimitriou, A.: Social networks as an attack platform: Facebook case study. In: Eighth International Conference on Networks, ICN 2009, Cancun, Mexico, March 1 - 6 (2009)
AttackAPI 2.0, http://www.gnucitizen.org/projects/attackapi/
iPoque Internet Study, http://www.ipoque.com
Cohen, Bram: BitTorrent Protocol 1.0, http://www.BitTorrent.org
SecurityFocus Vulnerability Database, http://www.securityfocus.com
Metasploit framework, http://www.metasploit.com
Nessus Security scanner, http://www.nessus.org
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Berlin Heidelberg
About this chapter
Cite this chapter
Patsakis, C., Alexandris, N. (2010). Intelligent Host Discovery from Malicious Software. In: Tsihrintzis, G.A., Virvou, M., Jain, L.C. (eds) Multimedia Services in Intelligent Environments. Smart Innovation, Systems and Technologies, vol 2. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13355-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-13355-8_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13354-1
Online ISBN: 978-3-642-13355-8
eBook Packages: EngineeringEngineering (R0)