The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, the number of mobile devices is increasing rapidly. Meanwhile, the amount of malicious software is rising almost exponentially, alongside the diversity and complexity of malware. The flexibility of Software-Defined Networking (SDN) provides an opportunity to develop a malware detection model in more efficient and flexible manner. In this paper, we propose a network behavior-based...
The growing popularity of Android and the increasing amount of sensitive data stored in mobile devices have lead to the dissemination of Android ransomware. Ransomware is a class of malware that makes data inaccessible by blocking access to the device or, more frequently, by encrypting the data; to recover the data, the user has to pay a ransom to the attacker. A solution for this problem is to backup...
Mobile devices are becoming targets for hackers and malicious users due to the multifold increase in its capabilities and usage. Security threats are more prominent in mobile payment and mobile banking applications (MBAs). As these MBAs, store, transmit and access sensitive and confidential information, so utmost priority should be given to secure MBAs. In this paper, we have analyzed MBAs of several...
Android has become the most widely used mobile operating system (OS) in recent years. There is much research on methods for detecting malicious Android applications. Dynamic analysis methods detect such applications by evaluating their behaviour during execution. However, such mechanisms may be ineffective as malware is often able to disable antimalware software. This paper presents the design of...
Mobile devices have become powerful and popular. Most internet applications or services are ported to mobile platforms. Confidential personal information such as credit card and password usually is stored in mobile devices for ubiquitous computing. Therefore, mobile devices become attack target due to financial gain. Mobile applications are published in various market places without or with little...
Mobile devices are used for communication and for tasks that are sensitive and subject to tampering. Indeed, attacks can be performed on the users' devices without user awareness, this represents additional risk in mission critical scenarios, such as Public Protection and Disaster Relief (PPDR). Intrusion Detection Systems are important for scenarios where information leakage is of crucial importance,...
Botnets have been a serious threat to the Internet security. With the constant sophistication and the resilience of them, a new trend has emerged, shifting botnets from the traditional desktop to the mobile environment. As in the desktop domain, detecting mobile botnets is essential to minimize the threat that they impose. Along the diverse set of strategies applied to detect these botnets, the ones...
In this paper, MobiX technology provides security for online services using mobile devices with a wide range of customers including governments, military, business enterprises, and scientific organization, and individuals have been proposed. MobiX is a software security solution technology to enhance the networked mobile device trustworthiness, application integrity, preventing users from malware...
While mobile applications make our lives more convenient, security concerns may arise when the mobile applications contain malicious code that would harm the mobile devices and their users financially and physically. In this article, we propose a malware detection framework to protect the mobile devices with the help of the cloud, where the cloud is equipped with the facilities for automatic analysis...
Many organizations suffer great losses due to risk materialization connected to implemented Bring Your Own Device (BYOD) policy because of missing implemented and maintained bests practices and standards for information security. With goal of better dealing with security vulnerabilities caused with implementation of new services and policies such as BYOD policy, measurement of maturity level in secure...
Mobile devices have enjoyed unprecedented growth in the last decade. As devices become more ubiquitous and users place more sensitive data on their devices, the amount of mobile malware in the wild has grown. In order to protect mobile device users and their data, mobile security solutions have been brought to market for consumer and enterprise users. The limited success observed in protecting devices...
This paper studies the impact of two base transceiver station selection mechanisms, namely, the distance-based eNodeB (DBM) and the signal power-based eNodeB (SPBM) mechanisms, on a mobile botnet launching a distributed denial of service (DDoS) attack on a Long Term Evolution (LTE) network. Simulation results using the Riverbed Modeller reveal that in comparison to DBM, using SPBM to enable the mobile...
Everyday lives are dependent on networked services. Endpoint data capture was a necessity and Bluetooth was developed as a viable option. It is a point to point short range wireless technology that provides high capacity data transfer. IEEE standards 802.15 commonly termed as Bluetooth support. Bluetooth has the facility of automatic detection and is extremely easy to use. First Bluetooth worm was...
With the advent of Advanced Persistent Threats (APTs) and exploits such as Eurograbber, we can no longer trust the user's PC or mobile phone to be honest in their transactions with banks. This paper reviews the current state of the art in protecting PCs from malware and APTs that can modify banking transactions, and identifies their strengths and weaknesses. It then proposes an enhanced USB device...
Effective detection of malware is of paramount importance for securing the next generation of smart devices. Static detection, the preferred technique used so far, is not sufficiently powerful to defeat state-of-the-art malware, and will be even less effective in the near future. Dynamic malware detection guarantees better protection since it operates at run-time and can identify also unknown malware,...
Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisational context, allowing employees to work using their personal devices. However, as personal mobile devices are perceived as less secure than those provided by the organisation, BYOD has risen security concerns about corporate information being accessed by mobile devices from inside and outside the...
The number of mobile device users is rapidly growing and spreading to new populations, such as seniors and children. Users are increasingly more vulnerable in the cyberspace despite available security measures. This leaves many opportunities for potential attackers as mobile devices are connected to the cyberspace practically 24/7. Unawareness of mobile device users who do not know neither the challenges...
Current day networks operate on multiple hardware devices assisted by numerous numbers of operating systems. Systems may have vulnerabilities. These are explored and then exploited. Among the overall malicious activity countries, India ranked third after US and China. This paper has made an attempt to explore possibility of quantifying various probabilities. Cyber system can be modeled in different...
In present scenario only computer system is not a medium of cyber crime, smart phones and tablets also have become targets for cyber criminals to attack. With the growing use of mobile devices, new mobile applications are developing daily and user download these apps onto their mobile devices from different sites. Attacker may utilize these sites by injecting malicious codes to mobile devices without...
With the efficient Internet access and increasing powerful computing capabilities of mobile device, the mobile botnet has becoming an emerging threat in the mobile Internet. In this paper, we propose a novel mobile botnet using the cloud platform consisting with multiple message push servers. The path delay is measured as the metrics to classify bots into different groups. A weighted round-robin algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.