Vector (malware)
(Redirected from Attack vector)
Jump to navigation
Jump to search
This article needs additional citations for verification. (March 2017) (Learn how and when to remove this template message) |
A vector in computing, specifically when talking about malicious code such as viruses or worms, is the method that this code uses to propagate itself or infect a computer. This sense is similar to, and derived from, its meaning in biology.
Some common vectors:
- buffer overflows – this is how the Blaster worm was able to propagate
- HTML email with JavaScript or other scripting enhancements
- networking protocol flaws
Web-based malware and vector[edit]
According to Provos et al., a web page is determined malicious "if it causes the automatic installation of software without the user's knowledge or consent". To increase the success rate of the vector (malware), malware is usually camouflaged by layers of code.[1]
Types of web-based malware include:
- Trojan
- Adware
- Unknown/Obfuscated: "A binary that has been obfuscated so that we could not determine its functionality."[1]
See also[edit]
References[edit]
- ^ a b Provos, Niels; McNamee, Dean. "The Ghost In The Browser Analysis of Web-based Malware" (PDF) – via UseNix. Cite journal requires
|journal=
(help)