A Unified Model for Computer Threat Protection (UMCTP)

被引:0
|
作者
Murtaza, Muhammad [1 ]
Sharif, Muhammad [1 ]
Raza, Mudassar [1 ]
Khan, Aman Ullah [1 ]
机构
[1] COMSATS Inst Informat Technol Wah Cantt, Dept Comp Sci, Punjab, Pakistan
来源
WCECS 2008: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE | 2008年
关键词
Antivirus; Virus; Open Source; Model; Threat; Protection;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper presents a unified way to unite major computer threat researchers, students, volunteers and amigos in antivirus industry under the umbrella of a Unified Model for Computer Threat Protection. The suggested model slices protection mechanism into two compatible parts to promote indigenous custom antivirus development. First part, rather static in nature, is unique custom antivirus software developed by individual organizations (users) that meets their specific needs. The other one, dynamic in nature, is the threat definition and research part contributed by global researchers' community in a standardized way to form a global public virus definition library. At the end a tentative sketch of such custom software for a strategic organization is also presented to model basic construct and essentials of an effective antivirus.
引用
收藏
页码:267 / 271
页数:5
相关论文
共 50 条
  • [31] The definition and calculation of the targets of "the elimination of viral hepatitis as a public health threat by 2030" should be concise and unified
    Xiao, Li
    Wang, Bo
    Xue, Rongrong
    Xian, Jianchun
    DISCOVER PUBLIC HEALTH, 2024, 21 (01)
  • [32] Model-driven engineering: A survey supported by the unified conceptual model
    da Silva, Alberto Rodrigues
    COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2015, 43 : 139 - 155
  • [33] The Cost of Self-Protection: Threat Response and Performance as a Function of Autonomous and Controlled Motivations
    Hodgins, Holley S.
    Weibust, Kristin S.
    Weinstein, Netta
    Shiffman, Sara
    Miller, Anita
    Coombs, Garth
    Adair, Kathryn C.
    PERSONALITY AND SOCIAL PSYCHOLOGY BULLETIN, 2010, 36 (08) : 1101 - 1114
  • [34] An Efficient Classification Model for Detecting Advanced Persistent Threat
    Chandran, Saranya
    Hrudya, P.
    Poornachandran, Prabaharan
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2001 - 2009
  • [35] Big Data Management System Security Threat Model
    Poltavtseva, M. A.
    Zegzhda, D. P.
    Kalinin, M. O.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 903 - 913
  • [36] Developing a threat model for enterprise storage area networks
    DeCusatis, Casimer
    2006 IEEE Information Assurance Workshop, 2006, : 9 - 14
  • [37] Leverage Points in a Computer Model
    Janosek, Michal
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2015 (ICNAAM-2015), 2016, 1738
  • [38] A Unified Forensic Model Applicable to the Database Forensics Field
    Alhussan, Amel Ali
    Al-Dhaqm, Arafat
    Yafooz, Wael M. S.
    Emara, Abdel-Hamid M.
    Bin Abd Razak, Shukor
    Khafaga, Doaa Sami
    ELECTRONICS, 2022, 11 (09)
  • [39] Survey on Architectural Attacks: A Unified Classification and Attack Model
    Ghasempouri, Tara
    Raik, Jaan
    Reinbrecht, Cezar
    Hamdioui, Said
    Taouil, Mottaqiallah
    ACM COMPUTING SURVEYS, 2024, 56 (02)
  • [40] Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation
    Vrhovec, Simon
    Mihelic, Anze
    COMPUTERS & SECURITY, 2021, 106