Detection Malware

Great Essays
Malicious software or malware occurs not because of technology failure but because of the human element, people can be easily manipulated through social engineering (Muscanell, Guagagno, & Murphy, 2014). Social engineering is the use psychological tactics to influence individuals to assist their own victimization.
The world of mobile devices keeps growing exponentially. Mobile devices, especially smartphones are easily accessible and with internet service they have become essential to people. The use of internet on mobile devices is called Internet of Things (IoT) services and they are monitored through the use of smartphone applications and services. There are thousands of applications or services that smartphones can do. For example, GPS,
…show more content…
Malware then was designed to be inserted into the applications by the repackaging method. There are various techniques to detect malware in mobile devices: signature-based detections, behavior-based detection and taint analysis-based detection.
Signature-based detections use functions like packet-processing and pattern-matching to detect malware. Behavior-based compares recorded activities like SMS or Bluetooth with user’s average use to analyze intrusions. Analysis-technique carries out static taint analysis for Java source code to detect malware. (Sik Ham, Hee Kim, Sup Kim & Jung Cho, 2014).
According to the 2012 ASEC report, the most of the Android-targeted malware was Trojan, spyware, root permission acquisition and installer (dropper). Trojan is the largest
…show more content…
230). Countermeasures should be implemented as part of the prevention method to ensure that the network and computers are secured as possible. Systems should be patched accordingly; access controls must be put in place to reduce potential infection to files. If prevention fails, then detection, identification and removal should be put in effect to successfully minimize denial-of-service costs. In addition, prevention mechanisms include anti-virus programs such as host-based scanners, generic decryption (GD) technology, host-based behavior-blocking software, spyware detection, rootkit countermeasures and intrusion prevention systems

Related Documents

  • Improved Essays

    The Win32/Sogou is a dangerous Trojan Downloader that invades the windows based PCs without getting permission from the user. This malicious application spreads through social media websites and can destroy a computer in a way that it becomes useless permanently. This tricky Trojan application is developed by the hackers to get remote access of the data and system folders in computer. Dalhousie University dataset contains both botnet and benign traces.…

    • 404 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy (Malware). Malware is able to accomplish this by its works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The type of malware that could be used is a Rootkit Malware. A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable.…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    1. Internal Bot If an attacker is attempting to breach the enterprise, they may attempt to insert a bot within the network which will wreak havoc on the organization’s system. The internal bot addresses security at the perimeter of the enterprise. The DPI (deep packet inspection) engine will identify network malware that’s attempting to penetrate the network.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    • Malicious process monitoring: We could make use of a tool like a windows registry accesses which helps tracks all the malicious programs trying to access the system. Such a tool on the dashboard greatly benefits the user since they can try keep the system safe without any external threats entering the system without notifying the user. The real time updating of the tool in this case will be easier because the user needs to only notified of programs that require them to look at the program as fast as they can. o Requires attention: The sub-point inside this metric could be a metric that can be called Requires Immediate attention. Not all the malicious software trying to access the system are of level 10 danger.…

    • 1042 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Another type of security event or baseline anomalie could be the increased network traffic which could indicate an unauthorized server, software, or potential malware. Shareware installed on a client device is a perfect example where network traffic could increase when downloading electric content onto a corporate network that could potentially be infected with malware. Shareware also opens up the device to sharing its data to the outside world potentially leaking propriatry and confidential data. Monitoring network bandwidth, closing firewall ports, and removing local administrator rights are a few ways to remediate shareware activity. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Ransom Ware Case Study

    • 421 Words
    • 2 Pages

    Case Project 2-5 Ransom ware is a program that prevents a user’s device from properly operating until a fee is paid. Ransom ware is malware that is highly profitable. Variation of ransom ware displays a fictitious warning that there is a problem with your computer, even if your computer is old or new, ransom ware reports the same problem. There are many types of ransom attacks, FBI warnings saying that you are a victim of child pornography is one that is most common and something we see on our computers today. A recent ransom ware attack happened in Hollywood.…

    • 421 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Summary Of Blue Pill

    • 826 Words
    • 4 Pages

    However, in order to understand what the malware does, it is necessary to understand the working of the computer system. At the core of the system is the kernel, or nucleus. This is a computer program that is the core of the system. It controls everything in the system and is the first program loaded at the startup (Rouse, 2016). It is normally loaded into a protected area of memory and takes requests from the software and translates it for use by the…

    • 826 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Apple vs. Android If you’ve ever had any doubts regarding the demand for smart phones, research done by IDC states that the global smart phone market has topped 1 billion shipments, covering about one seventh of the world’s population, a new milestone. Most everyone can agree that smart phones are a familiar way of life, but the big debate is whether a user’s best option is to pick out an Apple or Android device. While both Android and Apple dish out portable technology that keeps us connected, they go about it in contrasting ways.…

    • 731 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hackers Threat Analysis

    • 1037 Words
    • 5 Pages

    Introduction To understand threat actors and their motivation to hack into a system, we have first to examine their background, psychological factors and culture environment. Understanding threat actors include elements such as personality characteristics, motivations, and what drives or influence these criminals. Hackers break into systems for profit, thrills, bragging rights, and curiosity. There are several psychological factors which can often motivate hackers which can be money, fame, revenge, and personal thrills. Organizations today face many ominous cybersecurity concerns that must be addressed systematically and effectively to protect the organization, their customers, and employees.…

    • 1037 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Executive summary With the change in economic environment, technology is also changing. In the recent few years, the number of smart phone users has increased rapidly. The Smartphone has created a different image in the minds of people and became a part of their life. The Smartphone is not only the mode of communication, but also best medium of entertainment. Its different qualities and features have made it popular worldwide.…

    • 3878 Words
    • 16 Pages
    Improved Essays
  • Superior Essays

    Most, if not all, computers can be inflicted by Malicious software (Malware) are hard to fix an infection found in the system. It can lead to hacking, leaking of valuable information and a vulnerable threat to security. It requires no intervention to propagate across computer networks like the flu shot. Moreover, there are many types of malware like Trojan horses, viruses, worms, rootkits, spyware which penetrates specific application to deteriorate the system thus stealing confidential data from computer. As a consequence, these malware propagates through computer hardware gradually and pave a new way to penetrate operating system.…

    • 1094 Words
    • 4 Pages
    Superior Essays
  • Superior Essays

    1. Background Illuminate Creative hires one student to work on this project. The Company intends to develop a new application for business which provides a safety methodology for their users. The idea is, whenever a costumer feels that they are in a cause of worry or inconvenience, they just need to preset emergency list from mobile contacts with a timer or on a right away settings to push a single button. By doing so, the application will immediately notify the predefined emergency contacts of the costumer by sending their current position through using a GPS service to pin down the map and some predefined messages.…

    • 987 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    As people use smartphones more and more it is crucial that the smartphone keeps being safe. Important is to distinguish the ways security could be compromised. iOS jailbreaks for example, are bad for third party app developers and Apple since it enables users to download apps for free. However, in this chapter we will look for the security issues that are bad for the user, not for the companies. As there is a restriction as to how much we can cover here, we will only cover some the most important issues: permissions, lighter browsers, unofficial apps, network spoofing and data density.…

    • 787 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    However, this open system can lead to security problems once people are installing unofficial apps on their phones. These apps can be used as spy ones, stealing important information like passwords and bank account details. Nevertheless, people have a lot of options of choice. Many different brands can have many different smartphones since Android OS is an open system. Whereas iPhones has just one main model, Android Phones has much more diverse main options.…

    • 825 Words
    • 4 Pages
    Improved Essays

Related Topics