Privacy-Aware Malware Detection
نویسندگان
چکیده
Overview In cloud-infrastructure, cloud service providers (e.g. Amazon Web Service, IBM Cloud, Microsoft Azure) are not allowed to access the content of customer virtual machines. In consequence, it is hard for the providers to protect their infrastructure from malware infections. As the virtual machines are usually created from a limited set of standard images and likely share many vulnerabilities, malware can propagate rapidly through cloud-infrastructure and cause damage a much larger scale.
منابع مشابه
Personal Mobile Malware Guard PMMG: a mobile malware detection technique based on user's preferences
Mobile malware has increased rapidly last 10 years. This rapid increase is due to the rapid enhancement of mobile technology and their power to do most work for their users. Since mobile devices are personal devices, then a special action must be taken towards preserving privacy and security of the mobile data. Malware refers to all types of software applications with malicious behavior. In thi...
متن کاملA Survey of Privacy and Security Issues in Social Networks
Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount of information, they become a potential channel for attackers to exploit. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Soc...
متن کاملYet Another Intrusion Detection System Against Insider Attacks
detection and prevention (gateways, firewalls, IDS/IPS), tracking, tracing Another reason is the Protect data privacy against insider attacks: traceable system. However defending organizations from insider attacks is becoming a In that case, the retail company was informed by a malware detection system of intrusion, but the delayed because their other security tools failed to detect the intrusion.
متن کاملA Survey of Privacy and Security Issues in Social Networks
Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount of information, they become a potential channel for attackers to exploit. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Soc...
متن کاملPOSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths
With users’ increasing awareness of security and privacy issues, Android’s permission mechanism and other existing methods fall short to provide effective protection over user data. This paper presents SARRE, a Semantics-Aware Rule Recommendation and Enforcement system to detect critical information outflows and prevent information leakage. SARRE leverages runtime monitoring and statistical ana...
متن کامل