Software Vulnerabilities, Banking Threats, Botnets and Malware Self-Protection Technologies
نویسندگان
چکیده
Information security is the protection of information from a wide range of threats in order to ensure success business continuity by minimizing risks and maximizing the return of investments and business opportunities. In this paper, we study and discuss the software vulnerabilities, banking threats, botnets and propose the malware self-protection technologies.
منابع مشابه
Botnets — Secret Puppetry with Computers
Botnets have traditionally been and are still considered one of the top threats to Internet security. The scope of botnets transcends the boundaries of Internet security, leveraging a variety of technologies and strategies. They are capable of launching attacks at a massive scale that are difficult to defend. In this paper we describe anatomy of botnets and malware that recruits new bots, varia...
متن کاملMultivariate Statistical Analysis on Anomaly P2P Botnets Detection
Botnets population is rapidly growing and they become a huge threat on the Internet. Botnets has been declared as Advanced Malware (AM) and Advanced Persistent Threat (APT) listed attacks which is able to manipulate advanced technology where the intricacy of threats need for continuous detection and protection. These attacks will be almost exclusive for financial gain. P2P botnets act as bots t...
متن کاملCybercrime: The Case of Obfuscated Malware
Cybercrime has rapidly developed in recent years and malware is one of the major security threats in computer which have been in existence from the very early days. There is a lack of understanding of such malware threats and what mechanisms can be used in implementing security prevention as well as to detect the threat. The main contribution of this paper is a step towards addressing this by i...
متن کاملA Collaborative Approach to Botnet Protection
Botnets are collections of compromised computers which have come under the control of a malicious person or organisation via malicious software stored on the computers, and which can then be used to interfere with, misuse, or deny access to a wide range of Internet-based services. With the current trend towards increasing use of the Internet to support activities related to banking, commerce, h...
متن کاملMobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues
The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community. Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1105.1720 شماره
صفحات -
تاریخ انتشار 2011