A Research on Mobile Malware Model propagated Update Attacks
نویسندگان
چکیده
منابع مشابه
A Survey on Malware Attacks on Smartphones
Today, smartphone has become a part of our everyday lives since they enable us to access variety of services in time . At present , the usage of these mobile services has significantly increased due to the different forms of connectivity provided by smartphones, such as GPRS, Bluetooth and Wi-Fi. At the same time , the number of vulnerabilities exploiting these services and communication channe...
متن کاملPersonal Mobile Malware Guard PMMG: a mobile malware detection technique based on user's preferences
Mobile malware has increased rapidly last 10 years. This rapid increase is due to the rapid enhancement of mobile technology and their power to do most work for their users. Since mobile devices are personal devices, then a special action must be taken towards preserving privacy and security of the mobile data. Malware refers to all types of software applications with malicious behavior. In thi...
متن کاملA Survey on Various Malware Detection Techniques on Mobile Platform
With the rapid arrival of mobile platforms on the market, android Platform has become a market leader in 2015 Q2, according to IDC. As Android has ruling most of the market, the problem of malware threats and security is also increasing. In this review paper, a fastidious study of the terms related to mobile malware and the techniques used for the detection of malware is done. Some proposed met...
متن کاملOn Drive-by-download Attacks and Malware Classification
This paper provides a review and discussion on categorisation of malware and evaluation of techniques used by previous research in classifying malware into families. AI techniques used in previous research together with proposed solutions are discussed; some research questions identified and our future research direction is highlighted. Unsupervised algorithms provide higher speed clustering of...
متن کاملAnalysis on the Sequential Behavior of Malware Attacks
Overcoming the highly organized and coordinated malware threats by botnets on the Internet is becoming increasingly difficult. A honeypot is a powerful tool for observing and catching malware and virulent activity in Internet traffic. Because botnets use systematic attack methods, the sequences of malware downloaded by honeypots have particular forms of coordinated pattern. This paper aims to d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Korea Society of Digital Industry and Information Management
سال: 2015
ISSN: 1738-6667
DOI: 10.17662/ksdim.2015.11.2.047