Abstract
Many security related organizations periodically publish current network and systems security information, with the lists of top malware programs. These lists raises the question how these threats spreads out, if the worms (the only threat with own communication abilities) are low or missing on these lists. The paper discuss the research on malware network activity, aimed to deliver the answer to the question, what is the main infection channel of modern malware, done with the usage of virtual honeypot systems on dedicated, unprotected network. Systems setup, network and systems monitoring solutions, results of over three months of network traffic and malware monitoring are presented, along with the proposed answer to our research question.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Annual Report PandaLabs (2009), http://www.pandasecurity.com/img/enc/Annual_Report_Pandalabs_2009.pdf
The Top Cyber Security Risks, http://www.sans.org/top-cyber-security-risks/
Sunbelt Software Announces Top 10 Malware Threats for November, http://www.sunbeltsoftware.com/Press/Releases/?id=323
XenNetworking – Xen Wiki, http://wiki.xensource.com/xenwiki/XenNetworking
Q1 2007 Malware Outbreak Trends: Server-Side Polymorphic Malware Explodes Across Email, http://www.commtouch.com/files/document%20library
Q3 2009 Internet Threats Trend Report, http://www.commtouch.com/download/1548
AFICK (Another File Integrity Checker), http://afick.sourceforge.net/
Skrzewski, M.: Wykrywanie działania niepoźądanego oprogramowania. In: Nowe technologie sieci komputerowych, XIV konferencja Sieci Komputerowe, Zakopane 2007, WKiŁ, Warszawa (2007)
The Honeynet Project, http://www.honeynet.org/project
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Skrzewski, M. (2010). Monitoring Malware Activity on the LAN Network. In: Kwiecień, A., Gaj, P., Stera, P. (eds) Computer Networks. CN 2010. Communications in Computer and Information Science, vol 79. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13861-4_26
Download citation
DOI: https://doi.org/10.1007/978-3-642-13861-4_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13860-7
Online ISBN: 978-3-642-13861-4
eBook Packages: Computer ScienceComputer Science (R0)