A Survey on Various Security Threats and Classification of Malware Attacks, Vulnerabilities and Detection Techniques

نویسنده

  • G. Padmavathi
چکیده

The rapid growth of Wireless Network has raised a great concern for security threats. Currently, security is regarded as one of the critical parameter for the acceptance of any wireless networking technology. Any node under attack in wireless network presents an anomalous behavior called the malicious behavior. In this circumstance, the entire operation of a network gets troubled and to prevent such malicious behaviors, several security resolutions have been found. Malware is a common term that is used to define the type of malicious software that plays a vital role in security threats to the computer and Internet. In this paper, the categories of malware, malware vulnerabilities and the existing handling mechanisms are discussed. Keywords Security Threats, Malware Attacks, Malware Vulnerabilities, Malicious propagation. 1. Introduction A security threat is a potential cause of unwanted event, which may result in damage to a system or a network. Wireless networks are exposed to various threats and attacks. Out of which malware attacks pose serious threats to the wireless networks exploiting the fundamental limitations of wireless network [1], such as limited energy, dynamism in topology due to mobility and unreliable communication. Dr.(Mrs).G.Padmavathi, S.Divya, The International Journal of Computer Science & Applications (TIJCSA) ISSN – 2278-­‐1080, Vol. 2 No. 04 June 2013

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Analyzing and Defending Against Web-based Malware

Web-based malware is a growing threat to today’s Internet security. Attacks of this type are prevalent and lead to serious security consequences. Millions of malicious URLs are used as distribution channels to propagate malware all over the Web. After being infected, victim systems fall in the control of attackers, who can utilize them for various cyber crimes such as stealing credentials, spam...

متن کامل

A Survey on Security for Smartphone Device

The technological advancements in mobile connectivity services such as GPRS, GSM, 3G, 4G, Blue-tooth, WiMAX, and Wi-Fi made mobile phones a necessary component of our daily lives. Also, mobile phones have become smart which let the users perform routine tasks on the go. However, this rapid increase in technology and tremendous usage of the smartphones make them vulnerable to malware and other s...

متن کامل

A Novel Hybrid Approach for Email Spam Detection based on Scatter Search Algorithm and K-Nearest Neighbors

Because cyberspace and Internet predominate in the life of users, in addition to business opportunities and time reductions, threats like information theft, penetration into systems, etc. are included in the field of hardware and software. Security is the top priority to prevent a cyber-attack that users should initially be detecting the type of attacks because virtual environments are not moni...

متن کامل

Infinity-Norm Support Vector Machines Against Adversarial Label Contamination

Nowadays machine-learning algorithms are increasingly being applied in security-related applications like spam and malware detection, aiming to detect never-before-seen attacks and novel threats. However, such techniques may expose specific vulnerabilities that may be exploited by carefully-crafted attacks. Support Vector Machines (SVMs) are a well-known and widely-used learning algorithm. They...

متن کامل

Feature-based Malicious URL and Attack Type Detection Using Multi-class Classification

Nowadays, malicious URLs are the common threat to the businesses, social networks, net-banking etc. Existing approaches have focused on binary detection i.e. either the URL is malicious or benign. Very few literature is found which focused on the detection of malicious URLs and their attack types. Hence, it becomes necessary to know the attack type and adopt an effective countermeasure. This pa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013