Jump to content

Attack vector

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Citation bot (talk | contribs) at 16:43, 2 March 2021 (Add: authors 1-1. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Wikiminds34 | via #UCB_webform). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself or infect a computer. This sense is similar to, and derived from, its meaning in biology.

Some common vectors:

Web-based malware and vector

According to Provos et al., a web page is determined malicious "if it causes the automatic installation of software without the user's knowledge or consent". To increase the success rate of the vector (malware), malware is usually camouflaged by layers of code.[1] 

Types of web-based malware include:

  1. Trojan
  2. Adware
  3. Unknown/Obfuscated: "A binary that has been obfuscated so that we could not determine its functionality."[1]

See also

References

  1. ^ a b Provos, Niels; McNamee, Dean. "The Ghost In The Browser Analysis of Web-based Malware" (PDF) – via UseNix. {{cite journal}}: Cite journal requires |journal= (help)