Attack vector
Appearance
This article needs additional citations for verification. (March 2017) |
A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself or infect a computer. This sense is similar to, and derived from, its meaning in biology.
Some common vectors:
- buffer overflows – this is how the Blaster worm was able to propagate
- HTML email with JavaScript or other scripting enhancements
- networking protocol flaws
Web-based malware and vector
According to Provos et al., a web page is determined malicious "if it causes the automatic installation of software without the user's knowledge or consent". To increase the success rate of the vector (malware), malware is usually camouflaged by layers of code.[1]
Types of web-based malware include:
- Trojan
- Adware
- Unknown/Obfuscated: "A binary that has been obfuscated so that we could not determine its functionality."[1]
See also
References
- ^ a b Provos, Niels; McNamee, Dean. "The Ghost In The Browser Analysis of Web-based Malware" (PDF) – via UseNix.
{{cite journal}}
: Cite journal requires|journal=
(help)