Malware is a malignant code that expands over the connected frameworks in system. Malvertising is a malicious action that can distribute malware in different forms through advertising. Malware is the key of advertising and generate the revenue and for various Internet organizations, extensive advertisement systems; for example, Google, Yahoo and Microsoft contribute a ton of effort to moderate malicious advertising from their advertise network systems. This paper specifically discusses various types of detection techniques; procedures and analysis techniques for detect the malware threat. Malware detection method used to detect or identify the malicious activities so that malware could not harm the user system. Moreover the study includes about malicious advertising. This paper will look at the strategies utilized by adware as a part of their endeavours to stay inhabitant on the framework and analyze the sorts of information being separated from the client’s framework.
This is a preview of subscription content, log in via an institution to check access.
PreviewUnable to display preview. Download preview PDF.
Similar content being viewed by others ReferencesImtithal A Saeed, Ali Selamat, Ali MA Abuagoub: A survey on malware and malware detection systems. International Journal of Computer Applications, 67(16), doi:10.5120/11480-7108.(2013)
Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, and Wenke Lee. Understanding malvertising through ad-injecting browser extensions, 2015.
Andrew H Sung, Jianyun Xu, Patrick Chavez, and Srinivas Mukkamala. Static analyzer of vicious executables. In Computer Security Applications Conference, 2004. 20th Annual, pages 326–334. IEEE, 2004.
Robin sharp. An introduction to malware, spring 2012
Nitin Padriya and Nilay Mistry. Review of behaviour malware analysis for android. International Journal of Engineering and Innovative Technology (IJEIT) Volume, 2, 2008.
Muazzam Ahmed Siddiqui. Data mining method for malware detection.Proquest,2008
Ammar Ahmed Elhadi, Mohd Aizaini Maarof, and Ahmed Hamza Osman. Malware detection based on hybrid signature behaviour application programming interface call graph. American journal of applied Science, 9(3):283,2012
Zahra Bazrafshan, Hossein Hashemi, Seyed Mehdi Hazrati Fard, and Ali Hamzeh. A survey on heuristic malware detection techniques. In Information and Knowledge Technology (IKT), 2013 5th Conference on, pages 113–120. IEEE, 2013.
Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, and Saumya Debray. A semantics-based approach to malware detection. ACM Transactions on Programming Languages and Systems, 30(5):1–54, 2008.
Antarieu, F. et al., 2010, measuring the effectiveness of online advertising. Study conducted by PwC for IAB France and the Syndicat de Régies Internet, Paris.
Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. The dark alleys of Madison Avenue: Understanding malicious advertisements. In Proceedings of the 2014 Conference on Internet Measurement Conference, pages 373–380. ACM, 2014.
John Aycock. Spyware and Adware, volume 50. Springer Science & Business Media, 2010.
Eric Chien. Techniques of adware and spyware. In the Proceedings of the Fifteenth Virus Bulletin Conference, Dublin Ireland, volume 47, 2005.
Zarras, Apostolis, et al. “The dark alleys of Madison Avenue: Understanding malicious advertisements.” Proceedings of the 2014 Conference on Internet Measurement Conference. ACM, 2014.
Department of Computer Science and Engineering, Government Women Engineering College, Ajmer, India
Priya Jyotiyana & Saurabh Maheshwari
Correspondence to Priya Jyotiyana .
Editor information Editors and AffiliationsDept. of CS, School of Science, University of Salamanca Dept. of CS, School of Science, Salamanca, Spain
Juan Manuel Corchado Rodriguez
Machine Intelligence Unit, Indian Statistical Institute Machine Intelligence Unit, Kolkata, India
Sushmita Mitra
and Management – Kerala (IIITM-K), Indian Inst. of Information Technology and Management – Kerala (IIITM-K), Trivandrum, Kerala, India
Sabu M. Thampi
King Fahd Univ of Petroleum and Minerals , Dhahran, Saudi Arabia
El-Sayed El-Alfy
© 2016 Springer International Publishing AG
About this paper Cite this paperJyotiyana, P., Maheshwari, S. (2016). A Literature Survey on Malware and Online Advertisement Hidden Hazards. In: Corchado Rodriguez, J., Mitra, S., Thampi, S., El-Alfy, ES. (eds) Intelligent Systems Technologies and Applications 2016. ISTA 2016. Advances in Intelligent Systems and Computing, vol 530. Springer, Cham. https://doi.org/10.1007/978-3-319-47952-1_35
Download citationDOI: https://doi.org/10.1007/978-3-319-47952-1_35
Published: 18 September 2016
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47951-4
Online ISBN: 978-3-319-47952-1
eBook Packages: EngineeringEngineering (R0)
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.3