外文翻译计算机科学与技术Word文件下载.docx

上传人:b****4 文档编号:7176056 上传时间:2023-05-08 格式:DOCX 页数:23 大小:41KB
下载 相关 举报
外文翻译计算机科学与技术Word文件下载.docx_第1页
第1页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第2页
第2页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第3页
第3页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第4页
第4页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第5页
第5页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第6页
第6页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第7页
第7页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第8页
第8页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第9页
第9页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第10页
第10页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第11页
第11页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第12页
第12页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第13页
第13页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第14页
第14页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第15页
第15页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第16页
第16页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第17页
第17页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第18页
第18页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第19页
第19页 / 共23页
外文翻译计算机科学与技术Word文件下载.docx_第20页
第20页 / 共23页
亲,该文档总共23页,到这儿已超出免费预览范围,如果喜欢就下载吧!
下载资源
资源描述

外文翻译计算机科学与技术Word文件下载.docx

《外文翻译计算机科学与技术Word文件下载.docx》由会员分享,可在线阅读,更多相关《外文翻译计算机科学与技术Word文件下载.docx(23页珍藏版)》请在冰点文库上搜索。

外文翻译计算机科学与技术Word文件下载.docx

 

专业

计算机科学与技术

学生姓名

班级

学号

指导教师

信息工程学院

MobileMalwareandSmartDeviceSecurity:

Trends,ChallengesandSolutions

AbdullahiAraboandBernardiPranggono

TheOxfordInternetInstitute(OII),OxfordUniversity,Oxford,OX13JS,U.K.

SchoolofEngineeringandBuiltEnvironment,GlasgowCaledonianUniversity,Glasgow,G40BA,U.K.

Abstract—Thisworkispartoftheresearchtostudytrendsandchallengesofcybersecuritytosmartdevicesinsmarthomes.Wehaveseenthedevelopmentanddemandforseamlessinterconnectivityofsmartdevicestoprovidevariousfunctionalityandabilitiestousers.Whilethesedevicesprovidemorefeaturesandfunctionality,theyalsointroducenewrisksandthreats.Subsequently,currentcybersecurityissuesrelatedtosmartdevicesarediscussedandanalyzed.Thepaperbeginswithrelatedbackgroundandmotivation.Weidentifiedmobilemalwareasoneofthemainissueinthesmartdevices’security.Inthenearfuture,mobilesmartdeviceuserscanexpecttoseeastrikingincreaseinmalwareandnotableadvancementsinmalware-relatedattacks,particularlyontheAndroidplatformastheuserbasehasgrownexponentially.Wediscussandanalyzedmobilemalwareindetailsandidentifiedchallengesandfuturetrendsinthisarea.Thenweproposeanddiscussanintegratedsecuritysolutionforcybersecurityinsmartdevicestotackletheissue.

Index—Botnet,cybersecurity,mobilemalware,securityframework,smartdevicesecurity

I.INTRODUCTION

TheInternetisoneofthemostremarkabledevelopmentstohavehappenedtomankindinthelast100years.Thedevelopmentofubiquitouscomputingmakesthingsevenmoreinterestingasithasgivenusthepossibilitytoutilisedevicesandtechnologyinunusualways.Wehaveseenthedevelopmentanddemandforseamlessinterconnectivityofsmartdevicestoprovidevariousfunctionalitiesandabilitiestousers.Butwealsoknowthevulnerabilitiesthatexistwithinthisecosystem.However,thesevulnerabilitiesarenormallyconsideredforlargerinfrastructuresandlittleattentionhasbeenpaidtothecybersecuritythreatsfromtheusageandpowerofsmartdevicesasaresultoftheInternetofThings(IoT)technologies.IntheIoTvision,everyphysicalobjecthasavirtualcomponentthatcanproduceandconsumeservices.Smartspacesarebecominginterconnectedwithpowerfulsmartdevices(smartphones,tablets,etc.).Ontheotherhand,wealsohavethebackbone,thepowergridthatpowersournations.Thesetwophenomenaarecomingatthesametime.Theincreasedusageofsmartmetersinourhomesorbusinessesprovidesanavenueofconnectivityaswellaspowerfulhomeservicesorinterconnectedpowerfulsmartdevices.Theexampleofthesmartgridalsoprovidesthemeansofcontrollingandmonitoringsmartgridinfrastructuresviatheuseofportablesmartdevices.

Thevulnerabilityoftheconnectedhomeanddevelopmentswithintheenergyindustry’snewwirelesssmartgridareexposedtothewrongpeople;

itwillinevitablyleadtolightsoutforeveryone.ThiswilleventuallyuncoverthemultitudeofinterconnectedsmartdevicesintheIoTasahotbedforcyber-attacksorrobotnetworks(botnets)andasecuritynightmareforsmartspaceusersandpossiblyfornationalinfrastructuresasawhole.

Thelatestresearchhasreportedthatonaveragepeopleownthreeinternet-connectedsmartdevicessuchassmartphonesandtablets.Therefore,asaresultoftheubiquityofsmartdevices,andtheirevolutionascomputingplatforms,aswellasthepowerfulprocessorsembeddedinsmartdevices,hasmadethemsuitableobjectsforinclusioninabotnet.Botnetsofmobiledevices(alsoknownasmobilebotnets)areagroupofcompromisedsmartdevicesthatareremotelycontrolledbybot-mastersviacommand-and-control(C&

C)channels.MobilebotnetshavedifferentcharacteristicsinseveralaspectsascomparedtoPC-basedbotnets,suchastheirC&

Cchannelsmedium.

PC-basedbotnetsareseenasthemostcommonplatformsforsecurityattacks,andmobilebotnetsareseenaslessofathreatincomparisontotheircounterparts.Thisissofordifferentreasons,suchaslimitedbatterypower,resourceissues,andInternetaccessconstraints,etc.Therefore,theeffortsdirectedtoboththemanifestationofoperatingmobilebotnetsandcorrespondingresearchanddevelopmentendeavoursarenotaswideasforPC-basedbotnets.However,thisdevelopmentcouldchangewiththerecentsurgeinpopularityanduseofsmartdevices.Smartdevicesarenowwidelyusedbybillionsofusersduetotheirenhancedcomputingability,practicalityandefficientInternetaccess,thankstoadvancementinsolid-statetechnologies.

Moreover,smartdevicestypicallycontainalargeamountofsensitivepersonalandcorporatedataandareoftenusedinonlinepaymentsandothersensitivetransactions.Thewidespreaduseofopen-sourcesmartdeviceplatformssuchasAndroidandthird-partyapplicationsmadeavailabletothepublicalsoprovidesmoreopportunitiesandattractionsformalwarecreators.Therefore,fornowandthenearfuturesmartdeviceswillbecomeoneofthemostlucrativetargetsforcybercriminals.

Themainfocusofthispaperisthreefold:

firstlytohighlightthepossiblethreatsandvulnerabilityofsmartdevices,secondlytoanalysethechallengesinvolvedindetectingmobilemalwareinsmartdevicesandfinallytoproposeageneralsecuritysolutionthatwillfacilitatesolvingoraddressingsuchthreats.Therestofthepaperisorganizedasfollows.InsectionIIweprovideadetailedanalysisofthesecuritythreatsonsmartdevicesandtheirlinkswithcybersecurity.WehaveidentifiedmobilemalwareasoneofthemainissuesandwediscussitinmoredetailinSectionIII.SectionIVprovidesourproposedsecuritysolutionthatwillbeabletodetertheproblemsofmobilemalware.ThepaperisconcludedinsectionV.

II.SECURITYTHREATSONSMARTDEVICES

TheweakestlinkinanyITsecuritychainistheuser.Thehumanfactoristhemostchallengingaspectofmobiledevicesecurity.Homeusersgenerallyassumethateverythingwillworkjustasitshould,relyingonadevice’sdefaultsettingswithoutreferringtocomplextechnicalmanuals.Thereforeservicecontentprovidersandhardwarevendorsneedtobeawareoftheirresponsibilitiesinmaintainingnetworksecurityandcontentmanagementonthedevicestheyprovide.Serviceprovidersmightalsohavetheopportunitytoprovideadd-onsecurityservicestocomplementtheweaknessesofthedevices.

Theissueofcybersecurityismuchclosertothehomeenvironmentthanhasbeenusuallyunderstood;

hence,theproblemofcybersecurityextendsbeyondcomputersitisalsoathreattoportabledevices.Manyelectronicdevicesusedathomearepracticallyaspowerfulasacomputer-frommobilephones,videoconsoles,gameconsolesandcarnavigationsystems.Whilethesedevicesareportable,providemorefeaturesandfunctionality,theyalsointroducenewrisks.

Thesedevicespreviouslyconsideredassecurecanbeaneasytargetforassailants.Theinformationstoredandmanagedwithinsuchdevicesandhomenetworksformspartofanindividual’sCriticalInformationInfrastructure(CII)[2]asidentifiedbythePOSTnoteoncybersecurityintheUK.Forexample,anattackermaybeabletocompromiseasmartdevicewithavirus,toaccessthedataonthedevice.Notonlydotheseactivitieshaveimplicationsforpersonalinformation,buttheycouldalsohaveseriousconsequencesifcorporateinformationwerealsostoredonthesmartdevice.

Theuseofmobiledevicesinhealthcareisalsomorecommonthesedays,suchasinmobile-health.Atypicalexampleishavingahealthdeviceconnectedtothehomenetwork,whichiscapableoftransmittingdatawirelesslytohospitalsandotherrelevantparties.Mostofthemanufacturersofthesedevicesdonotputmucheffortintryingtomakesurethatthedevicesaresecure.Ifthesedevicesarecompromisednotonlywilltheinformationandprivacyoftheuserofthedevicebecompromised,buttheattackercanevenchangethesettingsofthedevices,whichcouldleadtoharmfulconsequences.Ithasbeenshownthatitispossibletohackintoapacemakerandreadthedetailsofdatastoredinthedevicesuchasnamesandmedicaldatawithouthavingdirectaccesstothedevicessimplybystandingnearby[3].

Therefore,itisalsopossibletoreconfiguretheparametersofthedevice.Thisisnotonlyapplicabletomedicaldevices,butalsotoanydevicesthatareusedwithinthehomenetworkforanypurpose.

AccordingtotheJuniperNetworksreport[4],76percentofmobileusersdependontheirmobiledevicestoaccesstheirmostsensitivepersonalinformation,suchasonlinebankingorpersonalmedicalinformation.Thistrendisevenmorenoticeablewiththosewhoalsousetheirpersonalmobiledevicesforbusinesspurposes.Nearlynineinten(89percent)businessusersreportthattheyusetheirmobiledevicetoaccesssensitivework-relatedinformation.

Anothermoreworryingimpactiswhencybercriminalsusethevastresourcesofthenetworktoturnitintoabotnetandlaunchacyber-attackonnationalcriticalinfrastructures.TherearesomeAndroidapplicationsthatwhendownloadedfromathirdpartymarket(nottheAndroidmarket)arecapableofaccessingtherootfunctionalityofdevices(“rooted”)andturningthemintobotnetsoldierswithouttheuser’sexplicitconsent.

Peoplecouldeasilyandunwittinglydownloadmalwaretotheirsmartdevicesorfallpreyto“man-in-the-middle”attackswherecyber-criminalsposeasalegitimatebody,interceptandharvestsensitiveinformationformalicioususe.In2011,therewasamixofAndroidapplicationsremovedfromtheAndroid

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 医药卫生 > 基础医学

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2