A Literature Survey on Malware and Online Advertisement Hidden Hazards (original) (raw)

Abstract

Malware is a malignant code that expands over the connected frameworks in system. Malvertising is a malicious action that can distribute malware in different forms through advertising. Malware is the key of advertising and generate the revenue and for various Internet organizations, extensive advertisement systems; for example, Google, Yahoo and Microsoft contribute a ton of effort to moderate malicious advertising from their advertise network systems. This paper specifically discusses various types of detection techniques; procedures and analysis techniques for detect the malware threat. Malware detection method used to detect or identify the malicious activities so that malware could not harm the user system. Moreover the study includes about malicious advertising. This paper will look at the strategies utilized by adware as a part of their endeavours to stay inhabitant on the framework and analyze the sorts of information being separated from the client’s framework.

Preview

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Imtithal A Saeed, Ali Selamat, Ali MA Abuagoub_: A survey on malware and malware detection systems_. International Journal of Computer Applications, 67(16), doi:10.5120/11480-7108.(2013)
  2. Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, and Wenke Lee. Understanding malvertising through ad-injecting browser extensions, 2015.
    Google Scholar
  3. Andrew H Sung, Jianyun Xu, Patrick Chavez, and Srinivas Mukkamala. Static analyzer of vicious executables. In Computer Security Applications Conference, 2004. 20th Annual, pages 326–334. IEEE, 2004.
    Google Scholar
  4. Robin sharp. An introduction to malware, spring 2012
    Google Scholar
  5. Nitin Padriya and Nilay Mistry. Review of behaviour malware analysis for android. International Journal of Engineering and Innovative Technology (IJEIT) Volume, 2, 2008.
    Google Scholar
  6. Muazzam Ahmed Siddiqui. Data mining method for malware detection.Proquest,2008
    Google Scholar
  7. Ammar Ahmed Elhadi, Mohd Aizaini Maarof, and Ahmed Hamza Osman. Malware detection based on hybrid signature behaviour application programming interface call graph. American journal of applied Science, 9(3):283,2012
    Google Scholar
  8. Zahra Bazrafshan, Hossein Hashemi, Seyed Mehdi Hazrati Fard, and Ali Hamzeh. A survey on heuristic malware detection techniques. In Information and Knowledge Technology (IKT), 2013 5th Conference on, pages 113–120. IEEE, 2013.
    Google Scholar
  9. Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, and Saumya Debray. A semantics-based approach to malware detection. ACM Transactions on Programming Languages and Systems, 30(5):1–54, 2008.
    Google Scholar
  10. Antarieu, F. et al., 2010, measuring the effectiveness of online advertising. Study conducted by PwC for IAB France and the Syndicat de Régies Internet, Paris.
    Google Scholar
  11. Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. The dark alleys of Madison Avenue: Understanding malicious advertisements. In Proceedings of the 2014 Conference on Internet Measurement Conference, pages 373–380. ACM, 2014.
    Google Scholar
  12. John Aycock_. Spyware and Adware_, volume 50. Springer Science & Business Media, 2010.
    Google Scholar
  13. Eric Chien. Techniques of adware and spyware. In the Proceedings of the Fifteenth Virus Bulletin Conference, Dublin Ireland, volume 47, 2005.
    Google Scholar
  14. Zarras, Apostolis, et al. _“The dark alleys of Madison Avenue: Understanding malicious advertisements._” Proceedings of the 2014 Conference on Internet Measurement Conference. ACM, 2014.
    Google Scholar

Download references

Author information

Authors and Affiliations

  1. Department of Computer Science and Engineering, Government Women Engineering College, Ajmer, India
    Priya Jyotiyana & Saurabh Maheshwari

Authors

  1. Priya Jyotiyana
    You can also search for this author inPubMed Google Scholar
  2. Saurabh Maheshwari
    You can also search for this author inPubMed Google Scholar

Corresponding author

Correspondence toPriya Jyotiyana .

Editor information

Editors and Affiliations

  1. Dept. of CS, School of Science, University of Salamanca Dept. of CS, School of Science, Salamanca, Spain
    Juan Manuel Corchado Rodriguez
  2. Machine Intelligence Unit, Indian Statistical Institute Machine Intelligence Unit, Kolkata, India
    Sushmita Mitra
  3. and Management – Kerala (IIITM-K), Indian Inst. of Information Technology and Management – Kerala (IIITM-K), Trivandrum, Kerala, India
    Sabu M. Thampi
  4. King Fahd Univ of Petroleum and Minerals , Dhahran, Saudi Arabia
    El-Sayed El-Alfy

Rights and permissions

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Jyotiyana, P., Maheshwari, S. (2016). A Literature Survey on Malware and Online Advertisement Hidden Hazards. In: Corchado Rodriguez, J., Mitra, S., Thampi, S., El-Alfy, ES. (eds) Intelligent Systems Technologies and Applications 2016. ISTA 2016. Advances in Intelligent Systems and Computing, vol 530. Springer, Cham. https://doi.org/10.1007/978-3-319-47952-1\_35

Download citation

Publish with us