Might Governments Clean-up Malware?

نویسنده

  • Richard Clayton
چکیده

End-user computers that have become infected with malware are a danger to their owners and to the Internet as a whole. Effective action to clean-up these computers would be extremely desirable, yet the incentives conspire to dissuade ISPs (and others) from acting. This paper proposes a role for government in subsidising the cost of clean-up. The organisations that tender for the government contract will factor in not only the costs of the clean-up, but also the profits they can make from their new consumer relationships. A model is proposed for what the tender price should be – and, by plugging in plausible values, it is shown that the cost to the tax payer of a government scheme could be less than a dollar per person per year; well in line with other public health initiatives.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LASETER AND ERIC JOHNSON A Better Way to

A Better Way to Battle Malware Emulating the methods used to transform production quality could clean up the Internet — and might even pay for itself.

متن کامل

An Efficient Framework to Build Up Malware Dataset

This research paper presents a framework on how to build up malware dataset. Many researchers took longer time to clean the dataset from any noise or to transform the dataset into a format that can be used straight away for testing. Therefore, this research is proposing a framework to help researchers to speed up the malware dataset cleaning processes which later can be used for testing. It is ...

متن کامل

Contrasting Permission Patterns between Clean and Malicious Android Applications

The Android platform uses a permission system model to allow users and developers to regulate access to private information and system resources required by applications. Permissions have been proved to be useful for inferring behaviors and characteristics of an application. In this paper, a novel method to extract contrasting permission patterns for clean and malicious applications is proposed...

متن کامل

COMPA: Detecting Compromised Accounts on Social Networks

As social networking sites have risen in popularity, cyber-criminals started to exploit these sites to spread malware and to carry out scams. Previous work has extensively studied the use of fake (Sybil) accounts that attackers set up to distribute spam messages (mostly messages that contain links to scam pages or drive-by download sites). Fake accounts typically exhibit highly anomalous behavi...

متن کامل

Mining permission patterns for contrasting clean and malicious android applications

Android application uses permission system to regulate the access to system resources and users’ privacy-relevant information. Existing work have demonstrated several techniques to study the required permissions declared by the developers, but few attention has been paid for used permissions. Besides, no specific permission combination is identified to be effective for malware detection. To fil...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010