{"title":"增强IM环境下的恶意软件检测","authors":"Yectli A. Huerta, Jigang Liu","doi":"10.1109/EIT.2008.4554303","DOIUrl":null,"url":null,"abstract":"As Instant Messaging (IM) becomes the favorite means of personal and work-related communications, the attacks exploiting vulnerabilities in IM will increase in frequency. Although some attacks employ well known strategies used in attacks on other communication systems, many are newly developed to exploit the properties unique to IM. In this paper, we present a new enhancement in controlling virus infections in IM systems. The new method is effective and easy to implement.","PeriodicalId":215400,"journal":{"name":"2008 IEEE International Conference on Electro/Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Enhancing malware detection in an IM environment\",\"authors\":\"Yectli A. Huerta, Jigang Liu\",\"doi\":\"10.1109/EIT.2008.4554303\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As Instant Messaging (IM) becomes the favorite means of personal and work-related communications, the attacks exploiting vulnerabilities in IM will increase in frequency. Although some attacks employ well known strategies used in attacks on other communication systems, many are newly developed to exploit the properties unique to IM. In this paper, we present a new enhancement in controlling virus infections in IM systems. The new method is effective and easy to implement.\",\"PeriodicalId\":215400,\"journal\":{\"name\":\"2008 IEEE International Conference on Electro/Information Technology\",\"volume\":\"4 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-05-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE International Conference on Electro/Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EIT.2008.4554303\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE International Conference on Electro/Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EIT.2008.4554303","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
As Instant Messaging (IM) becomes the favorite means of personal and work-related communications, the attacks exploiting vulnerabilities in IM will increase in frequency. Although some attacks employ well known strategies used in attacks on other communication systems, many are newly developed to exploit the properties unique to IM. In this paper, we present a new enhancement in controlling virus infections in IM systems. The new method is effective and easy to implement.