Search results for "malware"

showing 10 items of 32 documents

Honeypot Utilization for Network Intrusion Detection

2018

For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login. From the data, attacker behavior was analyzed. Differentiating bots from human actors, linking scanning activity to further attack steps, and identifying malware and tracking malware sites were all done. The knowledge gained could be used to enhance an organization’s cyber resiliency by identifying attacker motivations and the tools used. Automating analysis of h…

Software_OPERATINGSYSTEMSDictionary attackHoneypotComputer science020206 networking & telecommunications02 engineering and technology021001 nanoscience & nanotechnologycomputer.software_genreComputer securityLoginComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringMalwareNetwork intrusion detection0210 nano-technologycomputerSecurity system
researchProduct

Virtual USB honeypot

2019

This paper presents the implementation of a malware trap device. We created a virtual usb device through the use of microvisor on the ARM platform.

Trap (computing)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSSoftware_OPERATINGSYSTEMSHoneypotComputer sciencelawOperating systemMalwareUSBcomputer.software_genrecomputerlaw.inventionProceedings of the 12th ACM International Conference on Systems and Storage
researchProduct

Malware Detection in Internet of Things (IoT) Devices Using Deep Learning

2022

Internet of Things (IoT) devices usage is increasing exponentially with the spread of the internet. With the increasing capacity of data on IoT devices, these devices are becoming venerable to malware attacks; therefore, malware detection becomes an important issue in IoT devices. An effective, reliable, and time-efficient mechanism is required for the identification of sophisticated malware. Researchers have proposed multiple methods for malware detection in recent years, however, accurate detection remains a challenge. We propose a deep learning-based ensemble classification method for the detection of malware in IoT devices. It uses a three steps approach; in the first step, data is prep…

VDP::Teknologi: 500::Elektrotekniske fag: 540::Elektronikk: 541Internet of Things; malware detection; CNN; LSTMElectrical and Electronic EngineeringBiochemistryInstrumentationAtomic and Molecular Physics and OpticsAnalytical ChemistrySensors; Volume 22; Issue 23; Pages: 9305
researchProduct

Interneta drošības risinājumi

2015

Interneta drošības risinājumi. Oskars Veiss, darba vadītājs Latvijas Universitātes lektors Valdis Auza. Darba mērķis: Noskaidrot izkliedētā pakalpojuma attāluma(DDOS) un mēstuļu izplatību Latvijā un Pasaulē. Darba uzdevumi: 1.Apspoguļot izkliedētā pakalpojuma attāluma(DDOS) uzbrukumu būtību. 2.Apkopot informācija par tā attīstību (DDOS) 3.Izpētīt uzņēmuma aizsardzību pret šādiem uzbrukumiem 4.Sniegt rininājumus un priekšlikumus to novēršanai Pētījumā secināts, ka uzņēmuma nav izstrādāta efektīva aizsardzība pret šiem uzbrukumiem. Sniegti risinājumi un priekšlikumi tā aizsardzībai. Darbs satur 60lpp, 23 attēlus, 1 pielikums. Darba praktiskajā daļā veikta aptauja uzņēmumā „X”. Respondentu ska…

VadībzinātneMēstulesDrošībaDDOSMalware
researchProduct

The Myths of and Solutions for Android OS Controlled and Secure Environment

2015

<p class="R-AbstractKeywords"><span lang="EN-US">Android is the most popular mobile operating system nowadays both for smartphones and tablets. This fact creates many not fully recognized risks. Often even advanced users naive think that using antivirus software, firewall, encryption, updates, as well as avoiding potentially risky sites and applications are enough for security. This list is not full, but nevertheless each its item in most cases only conceals an illusion of reaching the security. Authors have summarized and pointed out several actual Android security issues and have proposed a number of possible solutions.</span></p><p class="R-AbstractKeywords"&gt…

Web serverEngineeringbusiness.industryMobile computingBring your own devicecomputer.software_genreComputer securityEncryptionWorld Wide WebServerMalwareWeb contentAndroid (operating system)businesscomputerAndroid; mobile computing; security; BYOD; smartphones; ICTEnvironment. Technology. Resources.
researchProduct

Security Implications of Using Third-Party Resources in the World Wide Web

2018

Modern web pages have nothing in common with the static connotation coming from the word “page” - it is a dynamic unique experience created by active content and executed within browser, just-in-time assembled from various resources hosted on many different domains. Active content increases attack surface naturally exposing users to many novel threats. A popular security advice has been to deploy active content blocker plugins like NoScript, unfortunately they are not capable to effectively stop the attacks. Content Security Policy (CSP) can be effective against these attacks, but we demonstrate how poor decisions made by website administrators or external resource hosters can render CSP in…

World Wide WebScripting languageComputer scienceCross-site scriptingWeb pageMalwareAttack surfaceContent Security Policycomputer.software_genreSecurity policycomputerVulnerability (computing)2018 IEEE 6th Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context

2010

Published version of an article from the journal: Wireless Personal Communications. The original publication is available at Spingerlink. http://dx.doi.org/10.1007/s11277-010-0069-6 The paper proposes a location-aware mobile Intrusion Prevention System (mIPS) architecture with enhanced privacy that is integrated in Managed Security Service (MSS). The solution is envisaged in a future fifth generation telecommunications (5G) context with increased but varying bandwidth, a virtualised execution environment and infrastructure that allows threads, processes, virtual machines and storage to be migrated to cloud computing services on demand, to dynamically scale performance and save power. 5G mob…

business.industryComputer scienceVDP::Technology: 500::Information and communication technology: 550Context (language use)Cloud computingIntrusion detection systemManaged security servicecomputer.software_genreComputer securityComputer Science ApplicationsInformation sensitivityVirtual machineMalwareElectrical and Electronic EngineeringIntrusion prevention systembusinesscomputerMobile deviceComputer networkWireless Personal Communications
researchProduct

Técnicas de aprendizaje automático para la detección de dominios maliciosos generados algorítmicamente

2022

Durante los últimos años, el desarrollo de software malicioso (malware) ha pasado de ser un sector donde la principal motivación era el reconocimiento de la comu- nidad a convertirse en un auténtico negocio multimillonario. Entre las diferentes técnicas que los desarrolladores de malware han empleado para dificultar su de- tección, está el uso de algoritmos de generación de dominios (en inglés, Domain Generation Algorithms o DGA). En el trabajo plasmado en esta tesis doctoral se ha analizado la problemática de esta técnica, se han revisado los diferentes tipos de algoritmos que se pueden encontrar y se ha estudiado el estado del arte en la detección de este tipo de algoritmos en cuanto a té…

dga:CIENCIAS TECNOLÓGICAS [UNESCO]malwareaprendizaje automáticoUNESCO::CIENCIAS TECNOLÓGICAS
researchProduct

Verkkohuijausten tyypit sosiaalisessa mediassa

2017

Types of online scams in social media. In this thesis, types of online scams in social media are examined first by defining online scams and then applying the principles of them to social media setting. The thesis is a literature review in which it was found that in social media there are similar types of scams than outside of it. These types of scams were phishing scams, scams related to social engineering malware attacks and 419 -scams. There were a couple of scam scenarios that were not detected outside of social media context due to social networking site required as a platform for the scams. These were scams involving impersonation of celebrities or friends, services offering followers…

haittaohjelmatkirjallisuuskatsausidentiteettivarkausmalwaresocial mediasosiaalinen mediaonline scamphishingverkkourkintasocial networking site
researchProduct

Image-based and range-based 3D modelling of archaeological cultural heritage: The telamon of the temple of Olympian Zeus in Agrigento (Italy)

2012

Abstract. The Temple of Olympian Zeus in Agrigento (Italy) was one of the largest temple and at the same time one of the most original of all the Greek architecture. We don’t know exactly how it was because the temple is now almost completely destroyed but it is very well-known for the presence of the Telamons. The Telamons were giant statues (about 8 meters high) probably located outside the temple to fill the interval between the columns. In accordance with the theory most accredited by archaeologists the Telamons were a decorative element and also a support for the structure. However, this hypothesis has never been scientifically proven. One Telamon has been reassembled and is shown at t…

lcsh:Applied optics. PhotonicsEngineeringbusiness.industrylcsh:Tlcsh:TA1501-1820Fotogrammetria Laser scanning Modelli 3D Beni archeologiciPhotogrammetry Laser scanning 3D Model Archaeological HeritageZeus (malware)Archaeologylcsh:TechnologyCultural heritagemedicine.anatomical_structurePhotogrammetrylcsh:TA1-2040TempleRange (statistics)medicineIBMArchitecturebusinesslcsh:Engineering (General). Civil engineering (General)Settore ICAR/06 - Topografia E CartografiaImage based
researchProduct