• No results found

What are the characteristics of IoT malware?

Investigating IoT malware characteristics to improve network security

Investigating IoT malware characteristics to improve network security

... the IoT malware. Wang et al [40] analyze multiple IoT malware which have appeared in the recent years and classify them into two categories according to the way they infect devices: one is by ...

82

Malware squid: a novel IoT malware traffic analysis framework using convolutional neural network and binary visualisation

Malware squid: a novel IoT malware traffic analysis framework using convolutional neural network and binary visualisation

... in the different tests. Four set tests were completed, where the fourth test is the final test with the most training samples that were collected being used. It is apparent from the four tests that the overall accuracy ...

12

IOT Malware : An Analysis of IOT Device Hijacking

IOT Malware : An Analysis of IOT Device Hijacking

... "starting" This malware is first found on October 5,2016 by Rapidity networks. Hajime utilizes Bit Torrent's UTP for direct peer to peer communication. The Hajime is a worm and it has a lifecycle comprises of ...

10

Lightweight Classification of IoT Malware Based on Image Recognition

Lightweight Classification of IoT Malware Based on Image Recognition

... two malware families in the case of three- class ...DDoS malware are similar, and mainly include receiving instructions from the control server and spreading the ...local malware filter proposed in ...

6

Malware threats and detection for industrial mobile-IoT networks

Malware threats and detection for industrial mobile-IoT networks

... Industrial IoT networks deploy heterogeneous IoT devices to meet a wide range of user ...public IoT cloud providers. A significant number of IoT cloud providers integrate smartphones to ...

18

Adversarial samples on android malware detection systems for IoT systems

Adversarial samples on android malware detection systems for IoT systems

... the malware without changing the malware functionality, so that the previously trained detection model misidentifies it as normal ...original malware, the disturbance does not reduce the existing ...

15

Probabilistic   and  Considerate  Attestation  of  IoT  Devices  against  Roving  Malware

Probabilistic and Considerate Attestation of IoT Devices against Roving Malware

... past, malware primarily targeted general-purpose computers and ...for malware, mainly because they are often numerous, connected to the Internet and/or inter-connected, and their security is poor or non- ...

8

Fuzzy pattern tree for edge malware detection and categorization in IoT

Fuzzy pattern tree for edge malware detection and categorization in IoT

... 35 fuzzy predicates on a given set of input attributes[26, 27]. FPT is competitive with other machine learning rival methods in terms of prediction performance. Moreover, it tends to produce compact models that are quite ...

20

On the IoT, from A to Z. What the slides are about? What is IoT? Internet of Things (IoT) is the Internet of Things

On the IoT, from A to Z. What the slides are about? What is IoT? Internet of Things (IoT) is the Internet of Things

... Web support Data transport Adapt to IPv6 Wireless CoAP UDP 6LowPAN Routing MAC Physical Sampling (reliability) Packet delivery Not only WSN.. Network: Wireless Sensor Network[r] ...

9

Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks

Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks

... like IoT have unique characteristics which are yet to be thoroughly ...to IoT networks consisting of wireless sensor nodes. We build IoT-SIS, a novel propagation model which considers the ...

15

Reassessing Android Malware Analysis: From Apps to IoT System Modelling

Reassessing Android Malware Analysis: From Apps to IoT System Modelling

... the malware is taken apart for studying its code structure, operation and ...Android malware use statically extracted data from the manifest file or from Android API function calls, as well as dynamically ...

9

Malware Analysis in Cloud Computing: Network and System Characteristics

Malware Analysis in Cloud Computing: Network and System Characteristics

... Fig. 1. System Overview whereas Section VI summarises and concludes this work. II. R ESILIENCE A PPROACH The overall architecture of our approach can be seen in Figure 1. For simplicity only three nodes are shown and the ...

6

1.
													A survey on various mobile malware attacks and security characteristics

1. A survey on various mobile malware attacks and security characteristics

... software characteristics of the mobile devices are ...mobile malware and its ...security characteristics related to mobile devices are discussed in this ...

7

Similarity hash based scoring of portable executable files for efficient malware detection in IoT

Similarity hash based scoring of portable executable files for efficient malware detection in IoT

... in malware analysis and ...cluster malware into families such that their common signature can be ...in malware analysis for portable executable (PE) ...quantitative malware score and to ...

13

Similarity hash based scoring of portable executable files for efficient malware detection in IoT

Similarity hash based scoring of portable executable files for efficient malware detection in IoT

... few. IoT is growing at enormous scale and is expected to be used in connecting billion of devices in the near ...of IoT increase, it becomes more vulnerable to various kinds of security breaches, such as ...

10

The Internet of Things (IoT): what is the potential of the internet of things (IoT) as a marketing tool?

The Internet of Things (IoT): what is the potential of the internet of things (IoT) as a marketing tool?

... this IoT strategy to operate a marketing orchestration platform from which they can receive, consume and leverage the data from these connected ...know what these particular customer needs ...

13

WHAT ARE THE CHARACTERISTICS OF RECORDS?

WHAT ARE THE CHARACTERISTICS OF RECORDS?

... & Trant, 1997; Duranti, 1997, 2001a, 2001b]. Some organizations are obligated to preserve records even if they are unstructured and miss important metadata such as author, and date. One example of this is a municipal ...

22

The Ongoing Malware Threat: How Malware Infects Websites and Harms Businesses and What You Can Do to Stop It

The Ongoing Malware Threat: How Malware Infects Websites and Harms Businesses and What You Can Do to Stop It

... Mobile devices are attractive targets for malware as well. In particular, mobile application stores are wildly popular with users—and they are a rapidly growing avenue for malware infections. 16 At the same ...

11

What is the Proper Forensics Approach on Trojan Banking Malware Incidents?

What is the Proper Forensics Approach on Trojan Banking Malware Incidents?

... banking malware incident has grown significantly and creates a great threat to online banking users ...of malware is known to use anti-forensic technique to avoid forensic ...banking malware samples: ...

12

Can a Strictly Defined Security Configuration for IoT Devices Mitigate the Risk of Exploitation by Botnet Malware?

Can a Strictly Defined Security Configuration for IoT Devices Mitigate the Risk of Exploitation by Botnet Malware?

... NSA who did not make Microsoft aware of the vulnerability. WannaCry works using a SMB (server message block) exploit which exploits a machine and then looks to use the exploited machine as a launchpad into an ...

114

Show all 10000 documents...

Related subjects