“By analyzing network traffic going to suspicious domains, security administrators could detect malware infections weeks or even months before they’re able to capture a sample of the invading malware, a new study suggests. The findings point toward the need for new malware-independent detection strategies that will give network defenders the ability to identify network security breaches in a more timely manner. The strategy would take advantage of the fact that malware invaders need to communicate with their command and control computers, creating network traffic that can be detected and analyzed. Having an earlier warning of developing malware infections could enable quicker responses and potentially reduce the impact of attacks, the study’s researchers say.”
Related Content
Related Posts:
- Researchers use architected auxetics to achieve 300 times more flexibility in new 3D printing design
- Physicists at Georgia Tech and engineers at UC Santa Barbara are exploring the shallow underground world with a burrowing soft robot
- Simple Robots, Smart Algorithms: Meet the BOBbots
- Collective Worm and Robot “Blobs” Protect Individuals, Swarm Together
- Slothbot Takes a Leisurely Approach to Environmental Monitoring
- Planetary Exploration Rover Avoids Sand Traps with “Rear Rotator Pedaling”
- Atomic-level imaging could offer roadmap to metals with new properties
- Stretchy Plastic Electrolytes Could Enable New Lithium-Ion Battery Design
- Soft Wearable Health Monitor Uses Stretchable Electronics
- Tiny Vibration-Powered Robots Are the Size of the World’s Smallest Ant