A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://link.springer.com/chapter/10.1007/978-3-319-47952-1_35 below:

A Literature Survey on Malware and Online Advertisement Hidden Hazards

Abstract

Malware is a malignant code that expands over the connected frameworks in system. Malvertising is a malicious action that can distribute malware in different forms through advertising. Malware is the key of advertising and generate the revenue and for various Internet organizations, extensive advertisement systems; for example, Google, Yahoo and Microsoft contribute a ton of effort to moderate malicious advertising from their advertise network systems. This paper specifically discusses various types of detection techniques; procedures and analysis techniques for detect the malware threat. Malware detection method used to detect or identify the malicious activities so that malware could not harm the user system. Moreover the study includes about malicious advertising. This paper will look at the strategies utilized by adware as a part of their endeavours to stay inhabitant on the framework and analyze the sorts of information being separated from the client’s framework.

This is a preview of subscription content, log in via an institution to check access.

Preview

Unable to display preview. Download preview PDF.

Similar content being viewed by others References
  1. Imtithal A Saeed, Ali Selamat, Ali MA Abuagoub: A survey on malware and malware detection systems. International Journal of Computer Applications, 67(16), doi:10.5120/11480-7108.(2013)

  2. Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, and Wenke Lee. Understanding malvertising through ad-injecting browser extensions, 2015.

    Google Scholar 

  3. Andrew H Sung, Jianyun Xu, Patrick Chavez, and Srinivas Mukkamala. Static analyzer of vicious executables. In Computer Security Applications Conference, 2004. 20th Annual, pages 326–334. IEEE, 2004.

    Google Scholar 

  4. Robin sharp. An introduction to malware, spring 2012

    Google Scholar 

  5. Nitin Padriya and Nilay Mistry. Review of behaviour malware analysis for android. International Journal of Engineering and Innovative Technology (IJEIT) Volume, 2, 2008.

    Google Scholar 

  6. Muazzam Ahmed Siddiqui. Data mining method for malware detection.Proquest,2008

    Google Scholar 

  7. Ammar Ahmed Elhadi, Mohd Aizaini Maarof, and Ahmed Hamza Osman. Malware detection based on hybrid signature behaviour application programming interface call graph. American journal of applied Science, 9(3):283,2012

    Google Scholar 

  8. Zahra Bazrafshan, Hossein Hashemi, Seyed Mehdi Hazrati Fard, and Ali Hamzeh. A survey on heuristic malware detection techniques. In Information and Knowledge Technology (IKT), 2013 5th Conference on, pages 113–120. IEEE, 2013.

    Google Scholar 

  9. Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, and Saumya Debray. A semantics-based approach to malware detection. ACM Transactions on Programming Languages and Systems, 30(5):1–54, 2008.

    Google Scholar 

  10. Antarieu, F. et al., 2010, measuring the effectiveness of online advertising. Study conducted by PwC for IAB France and the Syndicat de Régies Internet, Paris.

    Google Scholar 

  11. Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. The dark alleys of Madison Avenue: Understanding malicious advertisements. In Proceedings of the 2014 Conference on Internet Measurement Conference, pages 373–380. ACM, 2014.

    Google Scholar 

  12. John Aycock. Spyware and Adware, volume 50. Springer Science & Business Media, 2010.

    Google Scholar 

  13. Eric Chien. Techniques of adware and spyware. In the Proceedings of the Fifteenth Virus Bulletin Conference, Dublin Ireland, volume 47, 2005.

    Google Scholar 

  14. Zarras, Apostolis, et al. “The dark alleys of Madison Avenue: Understanding malicious advertisements.” Proceedings of the 2014 Conference on Internet Measurement Conference. ACM, 2014.

    Google Scholar 

Download references

Author information Authors and Affiliations
  1. Department of Computer Science and Engineering, Government Women Engineering College, Ajmer, India

    Priya Jyotiyana & Saurabh Maheshwari

Corresponding author

Correspondence to Priya Jyotiyana .

Editor information Editors and Affiliations
  1. Dept. of CS, School of Science, University of Salamanca Dept. of CS, School of Science, Salamanca, Spain

    Juan Manuel Corchado Rodriguez

  2. Machine Intelligence Unit, Indian Statistical Institute Machine Intelligence Unit, Kolkata, India

    Sushmita Mitra

  3. and Management – Kerala (IIITM-K), Indian Inst. of Information Technology and Management – Kerala (IIITM-K), Trivandrum, Kerala, India

    Sabu M. Thampi

  4. King Fahd Univ of Petroleum and Minerals , Dhahran, Saudi Arabia

    El-Sayed El-Alfy

Copyright information

© 2016 Springer International Publishing AG

About this paper Cite this paper

Jyotiyana, P., Maheshwari, S. (2016). A Literature Survey on Malware and Online Advertisement Hidden Hazards. In: Corchado Rodriguez, J., Mitra, S., Thampi, S., El-Alfy, ES. (eds) Intelligent Systems Technologies and Applications 2016. ISTA 2016. Advances in Intelligent Systems and Computing, vol 530. Springer, Cham. https://doi.org/10.1007/978-3-319-47952-1_35

Download citation

RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.3