Vigilante: end-to-end containment of internet worms
Proceedings of the twentieth ACM symposium on Operating systems principles
Hi-index | 0.00 |
Malware is one of the significant problems in the current Internet. Often security tool vendors develop an attack signature to deal with the attacks. However attack techniques such as polymorphism and metamorphism can be used by the attacker to generate multiple variants of the malware and complicate the signature identification. In this paper we present our analysis on sample set of malware and then discuss how MAEC's taxonomy can help to address the malware problem.