Advertisement

Intelligent Host Discovery from Malicious Software

  • Constantinos Patsakis
  • Nikolaos Alexandris
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 2)

Abstract

The wide spread of Internet in addition to the wide range of applications that use it, has opened new realms for the virus creators. As a result, during the past years, the dangers that computer viruses are exposing users are becoming more and more serious. In addition we do not have only computer viruses, but a big family of malicious software, which is spreading in range and numbers. The targets that most of these malware have is depicted in table 1.

Keywords

Social Networking Site Open Source Project Computer Virus Malicious Software Malicious Application 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
  2. 2.
  3. 3.
  4. 4.
    Constantinos, P., Nikolaos, A.: Torrent worms. In: 8th Joint Conference on Knowledge - Based Software Engineering, JCKBSE 2008, University of Piraeus, August 25 -28 (2008)Google Scholar
  5. 5.
    Patsakis, C., Asthenidis, A., Chatzidimitriou, A.: Social networks as an attack platform: Facebook case study. In: Eighth International Conference on Networks, ICN 2009, Gosier, Guadeloupe, France, March 1 - 6 (2009)Google Scholar
  6. 6.
    Constantinos, P., Nikolaos, A.: New malicious agents and SK virii. In: International Multi-Conference on Computing in the Global Information Technology, ICCGI 2007, Guadeloupe, France (2007)Google Scholar
  7. 7.
  8. 8.
    Szor, P.: The Art of Computer Virus Research and Defence. Addison-Wesley Professional, Reading (2005)Google Scholar
  9. 9.
    Provos, N., McClain, J., Wang, K.: Search Worms. In: Proceedings of the 4th ACM Workshop on Recurring Malcode, WORM 2006, pp. 1–8 (2006)Google Scholar
  10. 10.
    Long, J.: Google Hacking For Penetration Testers, vol. 1, Syngress (2005)Google Scholar
  11. 11.
    Long, J.: Google Hacking For Penetration Testers, vol. 2, Syngress (2005) Google Scholar
  12. 12.
    Weizenbaum, J.: ELIZA - A Computer Program For the Study of Natural Language Communication Between Man And Machine. Communications of the ACM 9(1), 36–45 (1966)CrossRefGoogle Scholar
  13. 13.
  14. 14.
    SCIgen - An Automatic CS Paper Generator, http://pdos.csail.mit.edu/scigen/
  15. 15.
  16. 16.
    Nielsen Net Ratings, http://www.nielsennetratings.com/
  17. 17.
    Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K.G., Markatos, E.P.: Antisocial Networks: Turning a Social Network into a Botnet. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 146–160. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  18. 18.
    Patsakis, C., Asthenidis, A., Chatzidimitriou, A.: Social networks as an attack platform: Facebook case study. In: Eighth International Conference on Networks, ICN 2009, Cancun, Mexico, March 1 - 6 (2009)Google Scholar
  19. 19.
  20. 20.
    iPoque Internet Study, http://www.ipoque.com
  21. 21.
    Cohen, Bram: BitTorrent Protocol 1.0, http://www.BitTorrent.org
  22. 22.
    SecurityFocus Vulnerability Database, http://www.securityfocus.com
  23. 23.
    Metasploit framework, http://www.metasploit.com
  24. 24.
    Nessus Security scanner, http://www.nessus.org

Copyright information

© Springer Berlin Heidelberg 2010

Authors and Affiliations

  • Constantinos Patsakis
    • 1
  • Nikolaos Alexandris
    • 1
  1. 1.Department of InformaticsUniversity of Piraeus 

Personalised recommendations