Corpus ID: 15690591

Searching for Malware in BitTorrent

@inproceedings{Berns2008SearchingFM,
  title={Searching for Malware in BitTorrent},
  author={Andrew Berns},
  year={2008}
}
One of the most widely publicized aspects of computer security has been the presence and propagation of malware. Malware has adapted to many dierent changing technologies, including recently-popular P2P systems. While previous work has examined P2P networks and protocols like KaZaA and Gnutella for malware, little has been done so far that examines BitTorrent. This project explored BitTorrent for the presence of malware, and discovered a signicant portion of malware in the downloaded le set… Expand
Clustering Malicious DNS Queries for Blacklist-Based Detection
Where Only Fools Dare to Tread: An Empirical Study on the Prevalence of Zero-Day Malware
Penny: Secure, Decentralized Data Management
Fake File Detection in P2P Networks by Consensus and Reputation
  • P. Watters, R. Layton
  • Computer Science
  • 2011 First International Workshop on Complexity and Data Mining
  • 2011
Preventing Ransomware on the Internet of Things

References

SHOWING 1-10 OF 15 REFERENCES
At http://www.vmware.com/products/server/ [19] Windows Server
  • At http://www.vmware.com/products/server/ [19] Windows Server
  • 2003
Top P2P applications: 1.6 million PCs rank them
  • MP3Newswire.net April
  • 2008
Viruslist.com P2P-Worm.Win32.Mandragore. Accessed April
  • Viruslist.com P2P-Worm.Win32.Mandragore. Accessed April
  • 2008
Malware in Popular Networks
  • Virus Bulletin Conference
  • 2005
File sharing’s new face.
  • The New York Times, February
  • 2004
Kazaa delivers more than tunes
  • Wired News
  • 2004
at http://www.wired.com/techbiz/media/news
  • Accessed April
  • 2004
At http://www.mininova
  • At http://www.mininova
...
1
2
...