首页> 外文OA文献 >Gone Rogue: An Analysis of Rogue Security Software Campaigns
【2h】

Gone Rogue: An Analysis of Rogue Security Software Campaigns

机译:盗贼:盗贼安全软件活动分析

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。
获取外文期刊封面目录资料

摘要

In the past few years, Internet miscreants have developed a number of techniques to defraud and make a hefty profit out of their unsuspecting victims. A troubling, recent example of this trend is cyber-criminals distributing rogue security software, that is malicious programs that,by pretending to be legitimate security tools (e.g., anti-virus or anti-spyware), deceive users into paying a substantial amount of money in exchange for little or no protection.While the technical and economical aspects of rogue security software (e.g., its distribution and monetization mechanisms) are relatively well-understood, much less is known about the campaigns through which this type of malware is distributed, that is what are the underlying techniques and coordinated efforts employed by cyber-criminals to spread their malware.In this paper, we present the techniques we used to analyze rogue security software campaigns, with an emphasis on the infrastructure employed in the campaign and the life-cycle of the clients that they infect.
机译:在过去的几年中,互联网上的不良行为者开发了许多技术,以骗取他们毫无戒心的受害者并从中牟取暴利。这种趋势的一个令人不安的最新例子是网络犯罪分子散布流氓安全软件,即恶意程序,它们假装成合法的安全工具(例如,防病毒或反间谍软件),诱骗用户支付大量的换取很少或根本没有保护的金钱。虽然流氓安全软件的技术和经济方面(例如其分发和货币化机制)相对容易理解,但对于散布此类恶意软件的活动知之甚少,这就是网络犯罪分子传播恶意软件所采用的基础技术和协调的工作。在本文中,我们介绍了用于分析流氓安全软件活动的技术,重点介绍了活动中使用的基础设施和生活-他们感染的客户的周期。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号