2014 International Electrical Engineering Congress (iEECON) 2014
DOI: 10.1109/ieecon.2014.6925944
|View full text |Cite
|
Sign up to set email alerts
|

Temporal behaviors of Top-10 malware download in 2010–2012

Abstract: Malware can be widely downloaded over tbe Internet by the bot-infected computers according to their botmaster in order to form a botnet and eventually to perform cyber attacks. This paper analyzes and summarizes the mal ware download behaviors of To p-10 malware based on 2010 CCC, 2011 CCC and 2012 I1J MITF datasets. The datasets contain millions of download logs collected from several Honeypots located in Japan observing malwarelbot traffic and activities. These log data have been processed and analyzed in te… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
references
References 3 publications
0
0
0
Order By: Relevance