Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "malware" wg kryterium: Temat


Tytuł:
Specialized genetic algorithm based simulation tool designed for malware evolution forecasting
Autorzy:
Juzonis, V.
Goranin, N.
Cenys, A.
Olifer, D.
Powiązania:
https://bibliotekanauki.pl/articles/106146.pdf
Data publikacji:
2012
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
genetic algorithm
malware
mobile malware
information security
Opis:
From the security point of view malware evolution forecasting is very important, since it provides an opportunity to predict malware epidemic outbreaks, develop effective countermeasure techniques and evaluate information security level. Genetic algorithm approach for mobile malware evolution forecasting already proved its effectiveness. There exists a number of simulation tools based on the Genetic algorithms, that could be used for malware forecasting, but their main disadvantages from the user’s point of view is that they are too complicated and can not fully represent the security entity parameter set. In this article we describe the specialized evolution forecasting simulation tool developed for security entities, such as different types of malware, which is capable of providing intuitive graphical interface for users and ensure high calculation performance. Tool applicability for the evolution forecasting tasks is proved by providing mobile malware evolution forecasting results and comparing them with the results we obtained in 2010 by means of MATLAB.
Źródło:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica; 2012, 12, 4; 23-37
1732-1360
2083-3628
Pojawia się w:
Annales Universitatis Mariae Curie-Skłodowska. Sectio AI, Informatica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Network Steganography in the DNS Protocol
Autorzy:
Drzymała, M.
Szczypiorski, K.
Urbański, M. Ł.
Powiązania:
https://bibliotekanauki.pl/articles/227099.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
DNS
network steganography
malware
Opis:
This paper presents possibility of using of the DNS (Domain Name System) protocol for creating a simplex communication channel between a malware-infected computer with a compromised DNS server. The proposed channel can be used to steal data or confidential enterprise information secretly.
Źródło:
International Journal of Electronics and Telecommunications; 2016, 62, 4; 343-346
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
WannaCry Ransomware: Analysis of Infection, Persistence, Recovery Prevention and Propagation Mechanisms
Autorzy:
Akbanov, Maxat
Vassilakis, Vassilios G.
Logothetis, Michael D.
Powiązania:
https://bibliotekanauki.pl/articles/309353.pdf
Data publikacji:
2019
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
dynamic malware analysis
ransomware
WannaCry
Opis:
In recent years, we have been experiencing fast proliferation of different types of ransomware targeting home users, companies and even critical telecommunications infrastructure elements. Modern day ransomware relies on sophisticated infection, persistence and recovery prevention mechanisms. Some recent examples that received significant attention include WannaCry, Petya and BadRabbit. To design and develop appropriate defense mechanisms, it is important to understand the characteristics and the behavior of different types of ransomware. Dynamic analysis techniques are typically used to achieve that purpose, where the malicious binaries are executed in a controlled environment and are then observed. In this work, the dynamic analysis results focusing on the infamous WannaCry ransomware are presented. In particular, WannaCry is examined, during its execution in a purpose-built virtual lab environment, in order to analyze its infection, persistence, recovery prevention and propagation mechanisms. The results obtained may be used for developing appropriate detection and defense solutions for WannaCry and other ransomware families that exhibit similar behaviors.
Źródło:
Journal of Telecommunications and Information Technology; 2019, 1; 113-124
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ICT security in tax administration : AV protection systems
Autorzy:
Muliński, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/2052434.pdf
Data publikacji:
2021
Wydawca:
Uniwersytet Przyrodniczo-Humanistyczny w Siedlcach
Tematy:
ICT security
malware
viruses
tax administration
Opis:
The article discusses the topic of ICT security in tax administration. This paper presents a study of the security level of endpoints8, servers using three antivirus protection systems. It discusses three independent solutions used to ensure the protection of ICT equipment in public administration.
Źródło:
Studia Informatica : systems and information technology; 2021, 1-2(25); 101-121
1731-2264
Pojawia się w:
Studia Informatica : systems and information technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wykorzystanie drzew sufiksowych do efektywnej prezentacji podobieństw sesji z systemu pułapek honeypot
Autorzy:
Skłodowski, Jakub
Arabas, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/13949978.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
honeypots
malware
session analysis
suffix trees
Opis:
The article presents a prototype of a system for analyzing data from a honeypot network. A special attention is paid to finding similarities in the collected ssh sessions. The algorithm proposed looks for generalized patterns in the session using suffix trees. The patterns can be used for a convenient presentation of the displayed sessions and for searching. The examples of analysis carried out with the help of the algorithm are presented.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 298-315
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Adapting text categorization for manifest based android malware detection
Autorzy:
Coban, Onder
Ozel, Selma Ayse
Powiązania:
https://bibliotekanauki.pl/articles/305467.pdf
Data publikacji:
2019
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
Android
malware detection
text categorization
machine learning
Opis:
Malware is a shorthand of malicious software that are created with the intent of damaging hardware systems, stealing data, and causing a mess to make money, protest something, or even make war between governments. Malware is often spread by downloading some applications for your hardware from some download platforms. It is highly probable to face with a malware while you try to load some applications for your smart phones nowadays. Therefore it is very important that some tools are needed to detect malware before loading them to the hardware systems. There are mainly three different approaches to detect malware: i) static, ii) dynamic, and iii) hybrid. Static approach analyzes the suspicious program without executing it. Dynamic approach, on the other hand, executes the program in a controlled environment and obtains information from operating system during runtime. Hybrid approach, as its name implies, is the combination of these two approaches. Although static approach may seem to have some disadvantages, it is highly preferred because of its lower cost. In this paper, our aim is to develop a static malware detection system by using text categorization techniques. To reach our goal, we apply text mining techniques like feature extraction by using bag-of-words, n-grams, etc. from manifest content of suspicious programs, then apply text classification methods to detect malware. Our experimental results revealed that our approach is capable of detecting malicious applications with an accuracy between 94.0% and 99.3%.
Źródło:
Computer Science; 2019, 20 (3); 305-327
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The impact of COVID-19 pandemic on cybersecurity in electronic banking in Poland
Autorzy:
Macierzyński, Wiesław Łukasz
Boczoń, Wojciech
Powiązania:
https://bibliotekanauki.pl/articles/16729748.pdf
Data publikacji:
2022
Wydawca:
Instytut Naukowo-Wydawniczy "SPATIUM"
Tematy:
cybersecurity
cyber threat
ransomware
phishing
smishing
vishing
spoofing
malware
Opis:
Purpose: The purpose of the article is to present both theoretical and practical basis for cybersecurity in electronic banking in Poland during the COVID-19 pandemic. During this period a major reorganisation of IT solutions occurred, which allowed to extend the range of online products and services offered both to bank customers and employees. As our life is more and more dependent on digital technologies, cyber attacks have become more costly and more dangerous. Driven by dynamic technological development regulations have changed, which resulted in cybersecurity becoming a key priority in financial institutions. All the more so because the rapid technological development has been followed by more and more advanced techniques used by criminals searching for easy financial profits. Methodology: The paper uses the method of literature review - mostly electronic sources,  descriptive and comparative analyses. Findings: From customers, perspective, the impact of COVID-19 pandemic on cybersecurity in electronic banking in Poland may be recognized as negative. The years 2020-2021 brought a dynamic growth in the number of digital banking customers, especially mobile banking. In those years financial institutions recorded  an enormous increase in online payments, which was the result of strong, forced by the pandemic, surge in sales in E-commerce. At the same time, there was a sharp rise in the crime rate targeted at banks, but most of all, at bank customers. While the security of the very financial institutions remained unthreatened, there was an explosion in the number of cybercrimes  targeted at E-banking users, with the losses giving dozens of millions PLN in total. That is reflected by the data provided by the National Bank of Poland, numerous complaints to the Financial Ombudsman, the Office of Competition and Consumer Protection, as well as the police investigations. Practical implications: The analysis of relations between theoretical and practical bases of cybersecurity in E-banking in Poland during the COVID-19 pandemic is a key factor for financial institutions. Cybercrime undermines customers' trust in E-channels and therefore negatively influences how banks are perceived, the level of the users' activity in digital channels, and consequently, activity and sales in E-channels. Besides the image and financial risks, banks need to take into consideration the increase in reputation, operation and legal risks. On these grounds, it is possible for state organisations and financial institutions to develop professional education concerning cybersecurity, not only for E-banking customers, but for the whole society.
Źródło:
Central European Review of Economics & Finance; 2022, 39, 4; 39-55
2082-8500
2083-4314
Pojawia się w:
Central European Review of Economics & Finance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Financial, Accounting and Tax Implications of Ransomware Attack
Finansowe, bilansowe i podatkowe konsekwencje ataku typu ransomware
Autorzy:
Krivokapić, Đorđe
Nikolić, Andrea
Stefanović, Aleksandra
Milosavljević, Miloš
Powiązania:
https://bibliotekanauki.pl/articles/31348373.pdf
Data publikacji:
2023
Wydawca:
Uniwersytet Marii Curie-Skłodowskiej. Wydawnictwo Uniwersytetu Marii Curie-Skłodowskiej
Tematy:
ransomware
malware
payment
accounting implications
złośliwe oprogramowanie
płatność
konsekwencje bilansowe
Opis:
Ransomware is a prime cybersecurity threat at the moment. In this paper we analyze financial implications of ransomware attacks, motivation of the ransomware victim to pay ransom, and legal, accounting and tax implications of such payment. The methodological approach used in the study is a combination of formal-dogmatic method and argumentative literature review. First, we provide an overview of all potential losses which could be incurred by the ransomware attack. Further, we analyze under which conditions is legal to pay any kind of ransom, including cyber ransom, as an organization as well as which other considerations victims should consider when deciding to pay ransom. In that respect we analyze accounting and tax implications of losses inflicted by the ransomware attack, putting special attention to the ransom payments.
Oprogramowanie typu ransomware jest obecnie istotnym zagrożeniem w zakresie cyberbezpieczeństwa. W niniejszym artykule analizujemy finansowe konsekwencje ataków typu ransomware, a także motywy zapłaty okupu przez ofiarę takiego ataku oraz prawne, bilansowe i podatkowe konsekwencje takiej zapłaty. Podejście metodologiczne zastosowane w pracy stanowi połączenie metody formalno-dogmatycznej z metodą krytyki literatury. Na początku opisujemy wszelkie potencjalne straty, jakie mogą wynikać z ataku ransomware. Następnie poddajemy analizie warunki, w których zapłata przez jednostkę organizacyjną okupu jakiegokolwiek rodzaju, w tym wymuszonego drogą komputerową, jest legalna, a także inne względy, które ofiara musi wziąć pod uwagę, decydując się na zapłatę okupu. W tym zakresie analizujemy bilansowe i podatkowe implikacje strat poniesionych na skutek ataku ransomware, ze szczególnym uwzględnieniem zapłaty okupu.
Źródło:
Studia Iuridica Lublinensia; 2023, 32, 1; 191-211
1731-6375
Pojawia się w:
Studia Iuridica Lublinensia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Yet another research on GANs in cybersecurity
Autorzy:
Zimoń, Michał
Kasprzyk, Rafał
Powiązania:
https://bibliotekanauki.pl/articles/13946602.pdf
Data publikacji:
2023-02-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cybersecurity
malware
artificial intelligence
machine learning
deep learning
generative adversarial networks
Opis:
Deep learning algorithms have achieved remarkable results in a wide range of tasks, including image classification, language translation, speech recognition, and cybersecurity. These algorithms can learn complex patterns and relationships from large amounts of data, making them highly effective for many applications. However, it is important to recognize that models built using deep learning are not fool proof and can be fooled by carefully crafted input samples. This paper presents the results of a study to explore the use of Generative Adversarial Networks (GANs) in cyber security. The results obtained confirm that GANs enable the generation of synthetic malware samples that can be used to mislead a classification model.
Źródło:
Cybersecurity and Law; 2023, 9, 1; 61-72
2658-1493
Pojawia się w:
Cybersecurity and Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Charakterystyka wybranych ataków socjotechnicznych w ujęciu teoretyczno-psychologicznym
Characteristics of selected socio-technical attacks in theoretical and psychological terms
Autorzy:
Szajstek, Daniel
Farysej, Aleksander
Powiązania:
https://bibliotekanauki.pl/articles/32444005.pdf
Data publikacji:
2022
Wydawca:
Fundacja PSC
Tematy:
Social engineering
phishing
vishing
smishing
osint
malware
psychology
manipulation
persuasion
influence
Opis:
This article is an overview of some of the most common cyberattacks. During the ongoing technological development, more and more users of cyberspace are exposed to social engineering attacks. Their easy preparation and effectiveness of the attack can cause serious consequences for the victims. The psychological part of the article will focus on the mechanisms that social engineers use. The psychological basis behind phishing, vishing and smishing will be described. The article will explain how the weaknesses of the human mind are exploited.
Źródło:
Alcumena. Pismo Interdyscyplinarne; 2022, 3(11); 19-35
2719-9851
Pojawia się w:
Alcumena. Pismo Interdyscyplinarne
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies