To read the full version of this content please select one of the options below:

A PRoactive malware identification system based on the computer hygiene principles

Vasileios Vlachos (Department of Management Science and Technology, Athens University of Economics and Business, Athens, Greece)
Diomidis Spinellis (Department of Management Science and Technology, Athens University of Economics and Business, Athens, Greece)

Information Management & Computer Security

ISSN: 0968-5227

Article publication date: 21 August 2007

760

Abstract

Purpose

To present a new technique that contains the spread of rapid malcode, which is based on peer‐to‐peer (P2P) communication and the principles of computer hygiene.

Design/methodology/approach

Two proof‐of‐concept prototypes demonstrate the feasibility of the introduced technique. The effectiveness of the proposed model is supported by experimental findings through simulation tests. Additional software tools have been developed to ensure the correctness of the simulation.

Findings

Provides supportive information regarding the efficiency of computer hygiene practices. Moreover, theoretical and empirical results show that P2P networks could play an important role in the containment of worm epidemics.

Research limitations/implications

A stable system deployed in large‐scale is yet to be implement in order to produce decisive results regarding the benefits of the proposed algorithm.

Practical implications

This paper argues that P2P networks can have significant impact on the containment of the rapid malcode.

Originality/value

This paper is an extended and revised version of the “PROMISing steps towards computer hygiene” paper which appeared in the INC2006 conference.

Keywords

Citation

Vlachos, V. and Spinellis, D. (2007), "A PRoactive malware identification system based on the computer hygiene principles", Information Management & Computer Security, Vol. 15 No. 4, pp. 295-312. https://doi.org/10.1108/09685220710817815

Publisher

:

Emerald Group Publishing Limited

Copyright © 2007, Emerald Group Publishing Limited

Related articles