CINXE.COM
TY - JFULL AU - Ryuya Uda PY - 2011/5/ TI - Protocol and Method for Preventing Attacks from the Web T2 - International Journal of Computer and Information Engineering SP - 379 EP - 385 VL - 5 SN - 1307-6892 UR - https://publications.waset.org/pdf/11661 PU - World Academy of Science, Engineering and Technology NX - Open Science Index 52, 2011 N2 - Nowadays, computer worms, viruses and Trojan horse become popular, and they are collectively called malware. Those malware just spoiled computers by deleting or rewriting important files a decade ago. However, recent malware seems to be born to earn money. Some of malware work for collecting personal information so that malicious people can find secret information such as password for online banking, evidence for a scandal or contact address which relates with the target. Moreover, relation between money and malware becomes more complex. Many kinds of malware bear bots to get springboards. Meanwhile, for ordinary internet users, countermeasures against malware come up against a blank wall. Pattern matching becomes too much waste of computer resources, since matching tools have to deal with a lot of patterns derived from subspecies. Virus making tools can automatically bear subspecies of malware. Moreover, metamorphic and polymorphic malware are no longer special. Recently there appears malware checking sites that check contents in place of users' PC. However, there appears a new type of malicious sites that avoids check by malware checking sites. In this paper, existing protocols and methods related with the web are reconsidered in terms of protection from current attacks, and new protocol and method are indicated for the purpose of security of the web. ER -