Malware is a continuously evolving problem for enterprise networks and home computers. Even security
aware users using updated security solutions fall into trap of zero day attacks. Moreover, blacklisting
based solutions suffer from problems of false positives and false negatives. From here, idea of Application
whitelisting was coined among security vendors and various solutions were evolved with same underlying
technology idea. This paper provides the details about design and implementation approaches and
discusses challenges while developing an effective whitelisting solution.
%0 Journal Article
%1 noauthororeditor
%A Pareek, Himanshu
%A Romana, Sandeep
%A Eswari, P R L
%D 2012
%J International Journal of Computer Science, Engineering and Information Technology (IJCSEIT)
%K Application Enterprise Malware Network Whitelisting
%N 5
%P 13-18
%R 10.5121/ijcseit.2012.2502
%T APPLICATION WHITELISTING: APPROACHES AND CHALLENGES
%U http://airccse.org/journal/ijcseit/papers/2512ijcseit02.pdf
%V 2
%X Malware is a continuously evolving problem for enterprise networks and home computers. Even security
aware users using updated security solutions fall into trap of zero day attacks. Moreover, blacklisting
based solutions suffer from problems of false positives and false negatives. From here, idea of Application
whitelisting was coined among security vendors and various solutions were evolved with same underlying
technology idea. This paper provides the details about design and implementation approaches and
discusses challenges while developing an effective whitelisting solution.
@article{noauthororeditor,
abstract = {Malware is a continuously evolving problem for enterprise networks and home computers. Even security
aware users using updated security solutions fall into trap of zero day attacks. Moreover, blacklisting
based solutions suffer from problems of false positives and false negatives. From here, idea of Application
whitelisting was coined among security vendors and various solutions were evolved with same underlying
technology idea. This paper provides the details about design and implementation approaches and
discusses challenges while developing an effective whitelisting solution. },
added-at = {2018-04-18T11:57:29.000+0200},
author = {Pareek, Himanshu and Romana, Sandeep and Eswari, P R L},
biburl = {https://www.bibsonomy.org/bibtex/228404c78655911e240854b8fd10f4f10/ijcseit},
doi = {10.5121/ijcseit.2012.2502},
interhash = {d8ff749596f868fe82bc1e827ec03c70},
intrahash = {28404c78655911e240854b8fd10f4f10},
issn = {2231-3117 [Online] ; 2231-3605 [Print]},
journal = {International Journal of Computer Science, Engineering and Information Technology (IJCSEIT)},
keywords = {Application Enterprise Malware Network Whitelisting},
language = {English},
month = oct,
number = 5,
pages = {13-18},
timestamp = {2018-04-18T11:57:29.000+0200},
title = {APPLICATION WHITELISTING: APPROACHES AND CHALLENGES},
url = {http://airccse.org/journal/ijcseit/papers/2512ijcseit02.pdf},
volume = 2,
year = 2012
}