Skip to main content

Intelligent Host Discovery from Malicious Software

  • Chapter
Multimedia Services in Intelligent Environments

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 2))

  • 378 Accesses

Abstract

The wide spread of Internet in addition to the wide range of applications that use it, has opened new realms for the virus creators. As a result, during the past years, the dangers that computer viruses are exposing users are becoming more and more serious. In addition we do not have only computer viruses, but a big family of malicious software, which is spreading in range and numbers. The targets that most of these malware have is depicted in table 1.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Symantec, http://www.symantec.com

  2. F-Secure, http://www.f-secure.com

  3. Sophos, http://www.sophos.com

  4. Constantinos, P., Nikolaos, A.: Torrent worms. In: 8th Joint Conference on Knowledge - Based Software Engineering, JCKBSE 2008, University of Piraeus, August 25 -28 (2008)

    Google Scholar 

  5. Patsakis, C., Asthenidis, A., Chatzidimitriou, A.: Social networks as an attack platform: Facebook case study. In: Eighth International Conference on Networks, ICN 2009, Gosier, Guadeloupe, France, March 1 - 6 (2009)

    Google Scholar 

  6. Constantinos, P., Nikolaos, A.: New malicious agents and SK virii. In: International Multi-Conference on Computing in the Global Information Technology, ICCGI 2007, Guadeloupe, France (2007)

    Google Scholar 

  7. Panda labs, http://www.pandalabs.com

  8. Szor, P.: The Art of Computer Virus Research and Defence. Addison-Wesley Professional, Reading (2005)

    Google Scholar 

  9. Provos, N., McClain, J., Wang, K.: Search Worms. In: Proceedings of the 4th ACM Workshop on Recurring Malcode, WORM 2006, pp. 1–8 (2006)

    Google Scholar 

  10. Long, J.: Google Hacking For Penetration Testers, vol. 1, Syngress (2005)

    Google Scholar 

  11. Long, J.: Google Hacking For Penetration Testers, vol. 2, Syngress (2005)

    Google Scholar 

  12. Weizenbaum, J.: ELIZA - A Computer Program For the Study of Natural Language Communication Between Man And Machine. Communications of the ACM 9(1), 36–45 (1966)

    Article  Google Scholar 

  13. Elbot, http://www.elbot.com/

  14. SCIgen - An Automatic CS Paper Generator, http://pdos.csail.mit.edu/scigen/

  15. Facebook, http://www.facebook.com

  16. Nielsen Net Ratings, http://www.nielsennetratings.com/

  17. Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K.G., Markatos, E.P.: Antisocial Networks: Turning a Social Network into a Botnet. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 146–160. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  18. Patsakis, C., Asthenidis, A., Chatzidimitriou, A.: Social networks as an attack platform: Facebook case study. In: Eighth International Conference on Networks, ICN 2009, Cancun, Mexico, March 1 - 6 (2009)

    Google Scholar 

  19. AttackAPI 2.0, http://www.gnucitizen.org/projects/attackapi/

  20. iPoque Internet Study, http://www.ipoque.com

  21. Cohen, Bram: BitTorrent Protocol 1.0, http://www.BitTorrent.org

  22. SecurityFocus Vulnerability Database, http://www.securityfocus.com

  23. Metasploit framework, http://www.metasploit.com

  24. Nessus Security scanner, http://www.nessus.org

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Berlin Heidelberg

About this chapter

Cite this chapter

Patsakis, C., Alexandris, N. (2010). Intelligent Host Discovery from Malicious Software. In: Tsihrintzis, G.A., Virvou, M., Jain, L.C. (eds) Multimedia Services in Intelligent Environments. Smart Innovation, Systems and Technologies, vol 2. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13355-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13355-8_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13354-1

  • Online ISBN: 978-3-642-13355-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics