Network intrusion detection in covariance feature space
Pattern Recognition
A two-tier system for web attack detection using linear discriminant method
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Hi-index | 0.00 |
Gone are the days when virus writers were driven simply by the kudos of a high profile attack. Criminal profit is their next step - but this is achieved by creating less sensational forms of virus attack. The focus is more on stealth malware, designed to steal identities, scam large sums of money from corporations, and remain invisible to anti-virus engines. By comparison, the most virulent viruses can be dealt with quickly and, on the whole, efficiently by an increasingly sophisticated anti-virus community. Low volume viruses are a new threat on the corporate horizon. The time between a virus being detected and signatures being issued by the anti-virus software vendors - the virus writer's 'window of exposure' - can be as little as a few hours.