The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, the number of mobile devices is increasing rapidly. Meanwhile, the amount of malicious software is rising almost exponentially, alongside the diversity and complexity of malware. The flexibility of Software-Defined Networking (SDN) provides an opportunity to develop a malware detection model in more efficient and flexible manner. In this paper, we propose a network behavior-based...
With an enormous increase in number of mobile users, mobile threats are also growing rapidly. Mobile malwares can lead to several cybersecurity threats i.e. stealing sensitive information, installing backdoors, ransomware attacks and sending premium SMSs etc. Previous studies have shown that due to the sophistication of threats and tailored techniques to avoid detection, not every antivirus system...
Botnets have become one of the most serious threats to current Internet and future network security. Only finding and connecting command and control(C&C) servers can bots join and work for botnet, hence how to find C&C servers is critical to botnet management and running. In this paper, we preliminarily summarize and classify the currently typical C&C server finding schemes as three types:...
With the efficient Internet access and increasing powerful computing capabilities of mobile device, the mobile botnet has becoming an emerging threat in the mobile Internet. In this paper, we propose a novel mobile botnet using the cloud platform consisting with multiple message push servers. The path delay is measured as the metrics to classify bots into different groups. A weighted round-robin algorithm...
Wormable system vulnerabilities continue to be identified and so fast spreading network worms continue to pose a threat to the Internet infrastructure due to their increased virulence, speed and sophistication in successive Internet-wide outbreaks. The cost of a single worm outbreak has been estimated to be as high as US $2.6 billion. In this paper, we report the empirical analysis of distributed...
It is necessary to protect services and users from diversified sources of cyber attacks even in complexly interconnected systems and networks. If a large number of smartphones in a mobile network are controlled by malware, they may be exploited to attack an application service in a fixed network. In this case, the conventional approach, which only protects the ingress and egress of services, cannot...
The rapid adoption of mobile devices comes with the growing prevalence of mobile malware. Mobile malware poses serious threats to personal information and creates challenges in securing network. Traditional network services provide connectivity but do not have any direct mechanism for security protection. The emergence of Software-Defined Networking (SDN) provides a unique opportunity to achieve network...
The undoubted success of very powerful and pervasively IP enabled cellular phones raises the obvious question whether the cellular world will also enter a severe security crisis like the PC itself. Moreover, this serious question is amplified through the use of new Open and even Web-OS oriented phone platforms. Considering the most dangerous security threat which might be given in the form of cellular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.