A Self-Relocation Based Method for Malware Detection

2012 ◽  
Vol 220-223 ◽  
pp. 2688-2693
Author(s):  
Yu Zhang ◽  
Feng Xia

Malware (malicious software) is software designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to a computer system. Most malwares propagate themselves throughout the Internet by self-relocation. Self-relocation is a built-in module in most malwares that gets the base address of the code to correctly infect the other programs. Since most legitimate computer programs do not need the self-relocate module, the detection of malware with self-relocation module can be viewed as a promising approach for malware detection. This paper presents a self-relocation based method for both known and previously unknown malwares. The experiments indicate that the proposed approach has better ability to detect known and unknown malwares than other methods.

2014 ◽  
Vol 8 (2) ◽  
pp. 29-34
Author(s):  
Alin Teodorus Drăgan

Hacking involves the attempt to compromise the security of a computer system in orderto gain unauthorized access. In the course of time it has turned out that the Internet is avulnerable system, and this has generated a framework for criminal activities, resulting in theemergence of new crimes, among which computer fraud.


2017 ◽  
Vol 25 (5) ◽  
pp. 1585-1601
Author(s):  
Wesam S Bhaya ◽  
Mustafa A Ali

Malicious software is any type of software or codes which hooks some: private information, data from the computer system, computer operations or(and) merely just to do malicious goals of the author on the computer system, without permission of the computer users. (The short abbreviation of malicious software is Malware). However, the detection of malware has become one of biggest issues in the computer security field because of the current communication infrastructures are vulnerable to penetration from many types of malware infection strategies and attacks.  Moreover, malwares are variant and diverse in volume and types and that strictly explode the effectiveness of traditional defense methods like signature approach, which is unable to detect a new malware. However, this vulnerability will lead to a successful computer system penetration (and attack) as well as success of more advanced attacks like distributed denial of service (DDoS) attack. Data mining methods can be used to overcome limitation of signature-based techniques to detect the zero-day malware. This paper provides an overview of malware and malware detection system using modern techniques such as techniques of data mining approach to detect known and unknown malware samples.


2009 ◽  
Vol 61 (3) ◽  
pp. 109
Author(s):  
Ralph L Scott

An antivirus program continuously monitors your computer to detect a virus, which is automatically deleted and/or quarantined. Firewall programs, on the other hand, block access to your computer from the Internet and prevent hackers from planting a worm or other type of malicious software in your computer. Firewalls protect your data, your computer, and your name from corruption. Stories are legion about the Internet being used to seize control of a computer identity to do things such as send out fake e-mails in your name canceling final exams, insulting your boss, and ordering merchandise such as ten pizzas to be delivered to your office. A good firewall will prevent such aremote seizure of your computer.


Author(s):  
Randall Rogan

Although Usama bin Laden is dead, the radical ideology that underscored his actions and those of his followers continues to live in his written and spoken communiqués, as well as those of other leaders of the jihadist movement. Of interest to this investigation is the internet publication Inspire, produced by al-Qaeda in the Arabian Peninsula (AQAP). At the core of these documents are the identity constructions of Self and Other. Previous research of terrorist writings highlights the centrality of Self and Other framing in advocacy for violence. Employing computational linguistic analyses, this investigation explored the identity frames published in Inspire. Results indicate that characterizations of the Self are as the victim of oppression by the Other, countered by frames of morality, purity, spirituality, and honor. Comparatively, the Other is framed as the actor towards the Self, engaging in aggressive, militaristic, and oppressive behaviors.


2016 ◽  
Vol 12 (29) ◽  
pp. 397 ◽  
Author(s):  
Elona Hasmujaj

Internet addiction is a kind of consumer behavior that has attracted the attention of many studies. Loneliness is a frequently reported mental illness addicted to the internet. Lonely individuals may be drawn online because of the increased potential for companionship, the changed social interaction patterns online, and as a way to modulate negative moods associated with loneliness. This study examines the relationship between internet addiction and loneliness among albanian students of University of Shkodra and the gender differences to this aspect. The participants to the research were 151 students from 18-23 years old, who live in different places of North Albania. In order to trace the connection between loneliness and Internet addiction among students was used the self-administered questionnaires: Internet Addiction Test (IAT) and UCLA Loneliness Scale. The research has shown that there is a mild negative correlation between loneliness and Internet addiction, on the other hand no gender differences was found in terms of internet addiction and loneliness level. The results suggest that students addicted to the Internet have significantly lower rates of loneliness.


Author(s):  
Nicoletta Sala

In the modelling of the natural shapes (clouds, ferns, trees, shells, rivers, mountains), the limits imposed by Euclidean geometry can be exceeded by the fractals. Fractal geometry is relatively young (the first studies are the works by the French mathematicians Pierre Fatou (1878-1929) and Gaston Julia (1893-1978) at the beginning of the 20th century), but only with the mathematical power of computers has it become possible to realize connections between fractal geometry and the other disciplines. It is applied in various fields now, from the biology to the architecture. Important applications also appear in computer science, because the fractal geometry permits to compress the images; to reproduce, in the virtual reality environments, the complex patterns and the irregular forms present in nature using simple iterative algorithms execute by computers. Recent studies apply this geometry for controlling the traffic in the computer networks (LANs, MANs, WANs, and the Internet) and in the realization of virtual worlds based on World Wide Web. The aim of this chapter is to present fractal geometry, its properties (e.g., the self similarity), and their applications in computer science (starting from the computer graphics, to the virtual reality).


2021 ◽  
Vol 11 (4) ◽  
pp. 7495-7500
Author(s):  
A. Al-Marghilani

Malware detection in Internet of Things (IoT) devices is a great challenge, as these devices lack certain characteristics such as homogeneity and security. Malware is malicious software that affects a system as it can steal sensitive information, slow its speed, cause frequent hangs, and disrupt operations. The most common malware types are adware, computer viruses, spyware, trojans, worms, rootkits, key loggers, botnets, and ransomware. Malware detection is critical for a system's security. Many security researchers have studied the IoT malware detection domain. Many studies proposed the static or dynamic analysis on IoT malware detection. This paper presents a survey of IoT malware evasion techniques, reviewing and discussing various researches. Malware uses a few common evasion techniques such as user interaction, environmental awareness, stegosploit, domain and IP identification, code obfuscation, code encryption, timing, and code compression. A comparative analysis was conducted pointing various advantages and disadvantages. This study provides guidelines on IoT malware evasion techniques.


2018 ◽  
Vol 8 (6) ◽  
pp. 3515-3520
Author(s):  
M. Tarhda ◽  
R. E. Gouri ◽  
L. Hlou

Nowadays we are witnessing a total convergence towards a digital world where information is digitized, conveyed and processed using highly developed techniques and tools. The development of broadband networks, including the internet, has made easy the manipulation, transmission and sharing of information. However, new security issues arise and they are particularly related to integrity, confidentiality and traceability of data. Facing this situation, network security has become very important and challenges related to the protection of exchanged data over the internet against unauthorized access and use have increased. In the current work, we propose to implement an optimized steganography technique over TCP/IP protocol [1]. We have also tested it against well-known security equipment using latest versions. We will see that they are inefficient to stop this kind of cover channels. Our work is like an alarm to every IT administrator to change their thinking about data lost prevention (DLP) and exfiltration of sensitive information.


An enhanced security for authentication is defined because it is vital that authentication is an extremely important crucial robust process for each user to access any of the applications. Magnificent growth and usage of the internet raise agitate about the way to communicate, protect data and sensitive information safely. In today's world hackers use differing types of attacks in order to acquire valuable information. Many of the attacks are primarily used to get into an application to steal the credentials followed by internal information of the users. The first thing of security is defined in three terms. i.e., confidentiality, integrity and availability. Confidentiality can protect information from unauthorized access and exploiting of sensitive data. Integrity measures protect information from unauthorized alteration. Whereas availability so as for a data system to be useful it must be available to authorized users. The most objective of this paper is to supply information about confidentiality in terms of multifactor authentication. Confidentiality plays a serious role in terms of authentication. Authentication is the process of proving or showing to be true. This includes confidentiality and integrity. The improved security for authentication is additionally known for multifactor authentication for the users. This multifactor authentication is implemented for an android application using a visual-picture login technique to access the an application.


Sign in / Sign up

Export Citation Format

Share Document