Difference between pages "Bloom Filters" and "Malware"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m
 
 
Line 1: Line 1:
=References=
+
'''Malware''' is a short version of '''Malicious Software'''.
* [http://www.internetmathematics.org/volumes/1/4/Broder.pdf Network Applications of Bloom Filters: A Survey], Andrei Broder and Michael Mitzenmacher, Internet Mathematics Vol. 1, No 4: 485--509
+
  
* [http://portal.acm.org/citation.cfm?id=1151659.1159950 Beyond bloom filters: from approximate membership checks to approximate state machines], Bonomi et all, ACM SIGCOMM Computer Communication Review archive, Volume 36 , Issue 4  (October 2006)
+
Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.
  
* Burton H. Bloom, [http://portal.acm.org/citation.cfm?id=362692&dl=GUIDE&coll=GUIDE&CFID=59101912&CFTOKEN=60283506 Space/time trade-offs in hash coding with allowable errors], Communications of the ACM, v.13 n.7, p.422-426, July 1970
+
== Virus ==
 +
A computer program that can automatically copy itself and infect a computer.
  
* [http://dfrws.org/2006/proceedings/11-Roussev.pdf md5bloom: Forensic filesystem hashing revisited], Vassil Roussev*, Yixin Chen, Timothy Bourg, Golden G. Richard III , 2006 DFRWS. Published by Elsevier Ltd.
+
== Worm ==
 +
A self-replicating computer program that can automatically infect computers on a network.
  
* [https://mice.cs.columbia.edu:443/getTechreport.php?techreportID=483 Privacy-Enhanced Searches Using Encrypted Bloom Filters], Bellovin and Cheswick, Columbia Univerisity Technical Report CUCS-034-07, 2004  [http://dimacs.rutgers.edu/Workshops/Privacy/slides/bellovin.pdf' DIMACS 2004 slides]
+
== Trojan horse ==
 +
A computer program which appears to perform a certain action, but actually performs many different forms of codes.
 +
 
 +
== Spyware ==
 +
A computer program that can automatically intercept or take partial control over the user's interaction.
 +
 
 +
== Exploit Kit ==
 +
A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits]. Often utilizing a drive-by-download.
 +
 
 +
=== Drive-by-download ===
 +
Any download that happens without a person's knowledge [http://en.wikipedia.org/wiki/Drive-by_download].
 +
 
 +
== See Also ==
 +
 
 +
== External Links ==
 +
* [http://en.wikipedia.org/wiki/Malware Wikipedia entry on malware]
 +
* [http://en.wikipedia.org/wiki/Drive-by_download Wikipedia drive-by-download]
 +
* [http://www.viruslist.com/ Viruslist.com]
 +
* [http://code.google.com/p/androguard/wiki/DatabaseAndroidMalwares Androguard]: A list of recognized Android malware
 +
 
 +
=== Exploit Kit ===
 +
* [http://blog.zeltser.com/post/1410922437/what-are-exploit-kits What Are Exploit Kits?], by [[Lenny Zeltser]], October 26, 2010
 +
* [http://nakedsecurity.sophos.com/2013/07/02/the-four-seasons-of-glazunov-digging-further-into-sibhost-and-flimkit/ The four seasons of Glazunov: digging further into Sibhost and Flimkit], by Fraser Howard on July 2, 2013
 +
 
 +
[[Category:Malware]]

Revision as of 01:05, 21 October 2013

Malware is a short version of Malicious Software.

Malware is software used for data theft, device damage, harassment, etc. It is very similar to computer malware. It installs things such as trojans, worms, and botnets to the affected device. It is illegal to knowingly distribute malware.

Virus

A computer program that can automatically copy itself and infect a computer.

Worm

A self-replicating computer program that can automatically infect computers on a network.

Trojan horse

A computer program which appears to perform a certain action, but actually performs many different forms of codes.

Spyware

A computer program that can automatically intercept or take partial control over the user's interaction.

Exploit Kit

A toolkit that automates the exploitation of client-side vulnerabilities, targeting browsers and programs that a website can invoke through the browser [1]. Often utilizing a drive-by-download.

Drive-by-download

Any download that happens without a person's knowledge [2].

See Also

External Links

Exploit Kit