A Literature Survey on Malware and Online Advertisement Hidden Hazards (original) (raw)
Abstract
Malware is a malignant code that expands over the connected frameworks in system. Malvertising is a malicious action that can distribute malware in different forms through advertising. Malware is the key of advertising and generate the revenue and for various Internet organizations, extensive advertisement systems; for example, Google, Yahoo and Microsoft contribute a ton of effort to moderate malicious advertising from their advertise network systems. This paper specifically discusses various types of detection techniques; procedures and analysis techniques for detect the malware threat. Malware detection method used to detect or identify the malicious activities so that malware could not harm the user system. Moreover the study includes about malicious advertising. This paper will look at the strategies utilized by adware as a part of their endeavours to stay inhabitant on the framework and analyze the sorts of information being separated from the client’s framework.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
- Imtithal A Saeed, Ali Selamat, Ali MA Abuagoub_: A survey on malware and malware detection systems_. International Journal of Computer Applications, 67(16), doi:10.5120/11480-7108.(2013)
- Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, and Wenke Lee. Understanding malvertising through ad-injecting browser extensions, 2015.
Google Scholar - Andrew H Sung, Jianyun Xu, Patrick Chavez, and Srinivas Mukkamala. Static analyzer of vicious executables. In Computer Security Applications Conference, 2004. 20th Annual, pages 326–334. IEEE, 2004.
Google Scholar - Robin sharp. An introduction to malware, spring 2012
Google Scholar - Nitin Padriya and Nilay Mistry. Review of behaviour malware analysis for android. International Journal of Engineering and Innovative Technology (IJEIT) Volume, 2, 2008.
Google Scholar - Muazzam Ahmed Siddiqui. Data mining method for malware detection.Proquest,2008
Google Scholar - Ammar Ahmed Elhadi, Mohd Aizaini Maarof, and Ahmed Hamza Osman. Malware detection based on hybrid signature behaviour application programming interface call graph. American journal of applied Science, 9(3):283,2012
Google Scholar - Zahra Bazrafshan, Hossein Hashemi, Seyed Mehdi Hazrati Fard, and Ali Hamzeh. A survey on heuristic malware detection techniques. In Information and Knowledge Technology (IKT), 2013 5th Conference on, pages 113–120. IEEE, 2013.
Google Scholar - Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, and Saumya Debray. A semantics-based approach to malware detection. ACM Transactions on Programming Languages and Systems, 30(5):1–54, 2008.
Google Scholar - Antarieu, F. et al., 2010, measuring the effectiveness of online advertising. Study conducted by PwC for IAB France and the Syndicat de Régies Internet, Paris.
Google Scholar - Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. The dark alleys of Madison Avenue: Understanding malicious advertisements. In Proceedings of the 2014 Conference on Internet Measurement Conference, pages 373–380. ACM, 2014.
Google Scholar - John Aycock_. Spyware and Adware_, volume 50. Springer Science & Business Media, 2010.
Google Scholar - Eric Chien. Techniques of adware and spyware. In the Proceedings of the Fifteenth Virus Bulletin Conference, Dublin Ireland, volume 47, 2005.
Google Scholar - Zarras, Apostolis, et al. _“The dark alleys of Madison Avenue: Understanding malicious advertisements._” Proceedings of the 2014 Conference on Internet Measurement Conference. ACM, 2014.
Google Scholar
Author information
Authors and Affiliations
- Department of Computer Science and Engineering, Government Women Engineering College, Ajmer, India
Priya Jyotiyana & Saurabh Maheshwari
Authors
- Priya Jyotiyana
You can also search for this author inPubMed Google Scholar - Saurabh Maheshwari
You can also search for this author inPubMed Google Scholar
Corresponding author
Correspondence toPriya Jyotiyana .
Editor information
Editors and Affiliations
- Dept. of CS, School of Science, University of Salamanca Dept. of CS, School of Science, Salamanca, Spain
Juan Manuel Corchado Rodriguez - Machine Intelligence Unit, Indian Statistical Institute Machine Intelligence Unit, Kolkata, India
Sushmita Mitra - and Management – Kerala (IIITM-K), Indian Inst. of Information Technology and Management – Kerala (IIITM-K), Trivandrum, Kerala, India
Sabu M. Thampi - King Fahd Univ of Petroleum and Minerals , Dhahran, Saudi Arabia
El-Sayed El-Alfy
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Jyotiyana, P., Maheshwari, S. (2016). A Literature Survey on Malware and Online Advertisement Hidden Hazards. In: Corchado Rodriguez, J., Mitra, S., Thampi, S., El-Alfy, ES. (eds) Intelligent Systems Technologies and Applications 2016. ISTA 2016. Advances in Intelligent Systems and Computing, vol 530. Springer, Cham. https://doi.org/10.1007/978-3-319-47952-1\_35
Download citation
- .RIS
- .ENW
- .BIB
- DOI: https://doi.org/10.1007/978-3-319-47952-1\_35
- Published: 18 September 2016
- Publisher Name: Springer, Cham
- Print ISBN: 978-3-319-47951-4
- Online ISBN: 978-3-319-47952-1
- eBook Packages: EngineeringEngineering (R0)