The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To protect many websites on cloud computing environments, we propose a scheme for monitoring the life cycles of malware download sites for websites and report the actual life cycles as monitored by web honeypots carrying vulnerable web applications. Recently, attackers have been using a large number of websites as hopping sites to attack other websites and user terminals. To create hopping sites,...
We investigated the distribution of malware on websites by constructing web honeypots carrying vulnerable web applications. With the diffusion of web services caused by the appearance of a new architecture known as cloud computing, a large number of websites have been used by attackers as hopping sites to attack other websites and user terminals. To construct hopping sites, many attackers force victims...
The number of smartphone users and mobile application offerings are growing rapidly. A smartphone is often expected to offer PC-like functionality. In this paper, we present Virtual Smartphone over IP system that allows users to create virtual smartphone images in the mobile cloud and to customize each image to meet different needs. Users can easily and freely tap into the power of the data center...
Unwanted communications such as SPIT (SPam over Internet Telephony) and number harvesting are expected to become serious problems as the use of VoIP (Voice over Internet Protocol) grows. Having call rates that are approaching zero, VoIP is becoming an attractive alternative media for delivering spam. Existing solutions to detect unwanted communications have problems, such as the requirement of modifying...
The VoIP technology has been increasingly popular and the number of its users has surged in the past years, because of its economical advantage over the traditional PSTN services. As a side effect, various VoIP servers and clients are becoming attractive targets of malicious attacks. This paper outlines the detection rules we have formulated to detect fuzzing attacks, which attempt to crash a VoIP...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.