Skip to main content

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 120))

  • 1342 Accesses

Abstract

Spam is usually used to propagate malware. Most spam leads to click the links or attached files by disguising it with social issues, entertainers, events, Christmas or New Year greetings, and friends using social engineering techniques. As a user clicks it, the user’s system is infected with malware. The infected systems can be used to various cyber-crimes. Recently such spam has been increased and that includes executable malware. In this paper, the results of the analysis of the malware attached in spam are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Szor P (2005) The art of computer virus research and defense. Addison Wesley Professional, Reading

    Google Scholar 

  2. Yang K, Lee S, Park W, Park K, Lim J (2009) A study on the analysis and detection method for protecting malware spreading via E-mail. J KIISC 19(1):93–101

    Google Scholar 

  3. Honeynet Project. “Know Your Enemy: Honeynets.” available at http://www.honeynet.org/papers/honeynet

  4. Miao Q, Wang Y, Cao Y, Zhang X, Liu Z (2010) APICapture—a tool for monitoring the behavior of malware. In: Proceedings of the 3rd international conference on advanced computer theory and engineering, pp 390–394

    Google Scholar 

  5. Nair VP, Jain H, Golecha YK, Gaur MS, Laxmi V (2010) MEDUSA: MEtamorphic malware dynamic analysis using signature from API. In: Proceedings of the 3rd international conference on security of information and networks, pp 263–269

    Google Scholar 

  6. Han KS, Im EG (2010) The Analysis of Malware Propagated through Spam. In: Proceedings of the 2010 winter conference of Korea information and communications society

    Google Scholar 

Download references

Acknowledgments

This research was supported by the MKE (The Ministry of Knowledge Economy), Korea, under the HNRC (Home Network Research Center)—TRC (Information Technology Research Center) support program supervised by the NIPA (National IT Industry Promotion Agency) (NIPA-2010-C1090-1011-0010).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Eul Gyu Im .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer Science+Business Media B.V.

About this paper

Cite this paper

Im, E.G., Han, KS. (2012). An Analysis of Malware Attached in Spam. In: Kim, K., Ahn, S. (eds) Proceedings of the International Conference on IT Convergence and Security 2011. Lecture Notes in Electrical Engineering, vol 120. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-2911-7_58

Download citation

  • DOI: https://doi.org/10.1007/978-94-007-2911-7_58

  • Published:

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-94-007-2910-0

  • Online ISBN: 978-94-007-2911-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics