Computer Virus and Protection Methods Using Lab Analysis

被引:0
作者
Khan, Haris A. [1 ]
Syed, Ali [1 ]
Mohammad, Azeem [1 ]
Halgamuge, Malka N. [1 ]
机构
[1] Charles Sturt Univ, Sch Comp & Math, Melbourne, Vic 3000, Australia
来源
2017 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA ANALYSIS (ICBDA) | 2017年
关键词
computer virus; computer threats; lab analysis;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The aim of this paper is to explore the hypothesis of a computer virus threat, and how destructive it can be if executed on a targeted machine. What are the possible counter measures to protect computers from these threats? In this study, we performed an analysis from the data extracted from different test of scenarios and labs conducted in a test environment. Information security risks associated with computer viruses can infect computers and other storage devices by copying themselves into a file and other executable programs. These file get infection and allow attackers to connect to target systems by using backdoors. The results of this study show that, the proper security implementations and the use of up to date operating systems patches and anti-virus programs helps users to prevent the loss of data and any viral attack on the system. Nevertheless, this observation could be used for further research in the network security and related fields; this study will also help computer users to use the possible steps and techniques to protect their systems and information from any possible attacks on their network systems.
引用
收藏
页码:882 / 886
页数:5
相关论文
共 11 条
  • [1] Aziz A., 2013, U. S. Patent No. 8, p[516, 593], Patent No. 516593
  • [2] Cohen F., 1987, Computers & Security, V6, P22, DOI 10.1016/0167-4048(87)90122-2
  • [3] Pham DV, 2010, PR ELECTROMAGN RES S, P350
  • [4] Universal serial bus based software attacks and protection solutions
    Dung Vu Pham
    Syed, Ali
    Halgamuge, Malka N.
    [J]. DIGITAL INVESTIGATION, 2011, 7 (3-4) : 172 - 184
  • [5] Lampson W. B., 2004, COMPUTER SECURITY RE
  • [6] Newman M.E.J., 2002, PHYS REV E, V66
  • [7] Detecting unknown computer worm activity via support vector machines and active learning
    Nissim, Nir
    Moskovitch, Robert
    Rokach, Lior
    Elovici, Yuval
    [J]. PATTERN ANALYSIS AND APPLICATIONS, 2012, 15 (04) : 459 - 475
  • [8] Parra VM, 2016, INT J ADV COMPUT SC, V7, P20
  • [9] Pham D.V., 2010, 2010 INT C INFORM EM, DOI [DOI 10.1109/ICIET.2010.5625728, 10.1109/ICIET.2010.5625728]
  • [10] Szor P, 2005, ART COMPUTER VIRUS R