A Research on Mobile Malware Model propagated Update Attacks

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey on Malware Attacks on Smartphones

Today, smartphone has become a part of our everyday lives since they enable us to access variety of services in time . At present , the usage of these mobile services has significantly increased due to the different forms of connectivity provided by smartphones, such as GPRS, Bluetooth and Wi-Fi. At the same time , the number of vulnerabilities exploiting these services and communication channe...

متن کامل

Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user's preferences

Mobile malware has increased rapidly last 10 years. This rapid increase is due to the rapid enhancement of mobile technology and their power to do most work for their users. Since mobile devices are personal devices, then a special action must be taken towards preserving privacy and security of the mobile data. Malware refers to all types of software applications with malicious behavior. In thi...

متن کامل

A Survey on Various Malware Detection Techniques on Mobile Platform

With the rapid arrival of mobile platforms on the market, android Platform has become a market leader in 2015 Q2, according to IDC. As Android has ruling most of the market, the problem of malware threats and security is also increasing. In this review paper, a fastidious study of the terms related to mobile malware and the techniques used for the detection of malware is done. Some proposed met...

متن کامل

On Drive-by-download Attacks and Malware Classification

This paper provides a review and discussion on categorisation of malware and evaluation of techniques used by previous research in classifying malware into families. AI techniques used in previous research together with proposed solutions are discussed; some research questions identified and our future research direction is highlighted. Unsupervised algorithms provide higher speed clustering of...

متن کامل

Analysis on the Sequential Behavior of Malware Attacks

Overcoming the highly organized and coordinated malware threats by botnets on the Internet is becoming increasingly difficult. A honeypot is a powerful tool for observing and catching malware and virulent activity in Internet traffic. Because botnets use systematic attack methods, the sequences of malware downloaded by honeypots have particular forms of coordinated pattern. This paper aims to d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Korea Society of Digital Industry and Information Management

سال: 2015

ISSN: 1738-6667

DOI: 10.17662/ksdim.2015.11.2.047