A Comparison of Trojan Virus Behavior in Linux and Windows Operating Systems

@article{AlSaadoon2011ACO,
  title={A Comparison of Trojan Virus Behavior in Linux and Windows Operating Systems},
  author={Ghossoon. M. W. Al-Saadoon and Hilal M. Y. Al-Bayatti},
  journal={CoRR},
  year={2011},
  volume={abs/1105.1234}
}
Trojan virus attacks pose one of the most serious threats to computer security. A Trojan horse is typically separated into two parts – a server and a client. It is the client that is cleverly disguised as significant software and positioned in peer-to-peer file sharing networks, or unauthorized download websites. The most common means of infection is through email attachments. The developer of the virus usually uses various spamming techniques in order to distribute the virus to unsuspecting… CONTINUE READING
Recent Discussions
This paper has been referenced on Twitter 1 time over the past 90 days. VIEW TWEETS
5 Citations
5 References
Similar Papers

References

Publications referenced by this paper.
Showing 1-5 of 5 references

‖The Complete Windows Trojans‖, cited; Available from: http://www.windowsecurity.com/whitepapers/The_Complete_Windows_Tr ojans_Paper.html

  • D. Danchev
  • Aug 29,
  • 2005
1 Excerpt

Trojan Horse Primer", http;//windowsecurity.com/articles/Trojan_horse_primer.html ,2004

  • R JShimonski
  • 2004
1 Excerpt

Computer Viruses: The Threat Today and The Expected Future

  • X. Li
  • 2003

An Overview of Computer Viruses in a Paper Environment

  • M. Bishop
  • 1999

Computer Viruses : The Threat Today and The Expected Future . p . 71 . , 2003 . [ 6 ] P 2 P - Worm . Win 32 . BlackControl . g , Trojan Programs

  • X. Li

Similar Papers

Loading similar papers…