外文翻译_计算机科学与技术

更新时间:2023-07-08 17:25:31 阅读: 评论:0

毕业设计(论文)
外文文献翻译
易经名言
专业
计算机科学与技术
学生姓名
班级
学号
关羽个人介绍指导教师
快速睡眠方法
重度强迫症工 明天再见
Mobile Malware and Smart Device Security:Trends, Challenges and Solutions               
透水预兆              Abdullahi Arabo and Bernardi Pranggono
The Oxford Internet Institute (OII), Oxford University, Oxford, OX1 3JS, U.K.
School of Engineering and Built Environment, Glasgow Caledonian University, Glasgow, G4 0BA, U.K.
Abstract 五年级阅读记录卡This work is part of the rearch to study trends and 鹅绒羽绒服challenges of cyber curity to smart devices in smart homes. We have en the development and demand for amless interconnectivity of smart devices to provide various functionality and abilities to urs. While the devices provide more features and functionality, they also introduce new risks and threats. Subquently, current cyber curity issues related to smart devices are discusd and analyzed. The paper begins with related background and motivation. We identified mobile malware as one of the main issue in the smart devices’ curity. In the near future, mobile smart device urs can expect to e a striking increa in malware and notable advancements in malware-related attacks, particularly on the Android platform as the ur ba has grown exponentially. We discuss and analyzed mobil
e malware in details and identified challenges and future trends in this area. Then we propo and discuss an integrated curity solution for cyber curity in smart devices to tackle the issue.
Index — Botnet, cyber curity, mobile malware, curity framework, smart device curity
I. INTRODUCTION
The Internet is one of the most remarkable developments to have happened to mankind in the last 100 years. The development of ubiquitous computing makes things even more interesting as it has given us the possibility to utili devices and technology in unusual ways. We have en the development and demand for amless interconnectivity of smart devices to provide various functionalities and abilities to urs. But we also know the vulnerabilities that exist within this ecosystem. However, the vulnerabilities are normally considered for larger infrastructures and little attention has been paid to the cyber curity threats from the usage and power of smart devices as a result of the Intern
et of Things (IoT) technologies. In the IoT vision, every physical object has a virtual component that can produce and consume rvices. Smart spaces are becoming interconnected with powerful smart devices (smartphones, tablets, etc.). On the other hand, we also have the backbone, the power grid that powers our nations. The two phenomena are coming at the same time. The incread usage of smart meters in our homes or business provides an avenue of connectivity as well as powerful home rvices or interconnected powerful smart devices. The example of the smart grid also provides the means of controlling and monitoring smart grid infrastructures via the u of portable smart devices.
The vulnerability of the connected home and developments within the energy industry’s new wireless smart grid are expod to the wrong people; it will inevitably lead to lights out for everyone. This will eventually uncover the multitude of interconnected smart devices in the IoT as a hotbed for cyber-attacks or robot networks (botnets) and a curity nightmare for smart space urs and possibly for national infrastructures as a whole.
The latest rearch has reported that on average people own three internet-connected smart devices such as smartphones and tablets. Therefore, as a result of the ubiquity of smart devices, and their evolution as computing platforms, as well as the powerful processors embedded in smart devices, has made them suitable objects for inclusion in a botnet. Botnets of mobile devices (also known as mobile botnets) are a group of compromid smart devices that are remotely controlled by bot-masters via command-and-control (C&C) channels. Mobile botnets have different characteristics in veral aspects as compared to PC-bad botnets, such as their C&C channels medium.
PC-bad botnets are en as the most common platforms for curity attacks, and mobile botnets are en as less of a threat in comparison to their counterparts. This is so for different reasons, such as limited battery power, resource issues, and Internet access constraints, etc. Therefore, the efforts directed to both the manifestation of operating mobile botnets and corresponding rearch and development endeavours are not as wide as for PC-bad botnets. However, this development could change with the recent surge in popularity and u of smart devices. Smart devices are now widely ud by billio
ns of urs due to their enhanced computing ability, practicality and efficient Internet access, thanks to advancement in solid-state technologies.
Moreover, smart devices typically contain a large amount of nsitive personal and corporate data and are often ud in online payments and other nsitive transactions. The wide spread u of open-source smart device platforms such as Android and third-party applications made available to the public also provides more opportunities and attractions for malware creators. Therefore, for now and the near future smart devices will become one of the most lucrative targets for cybercriminals.
The main focus of this paper is threefold: firstly to highlight the possible threats and vulnerability of smart devices, condly to analy the challenges involved in detecting mobile malware in smart devices and finally to propo a general curity solution that will facilitate solving or addressing such threats. The rest of the paper is organized as follows. In ction II we provide a detailed analysis of the curity threats on smart devices and their links with cyber curity. We have identified mobile malware as one of t
he main issues and we discuss it in more detail in Section III. Section IV provides our propod curity solution that will be able to deter the problems of mobile malware. The paper is concluded in ction V.
II. SECURITY THREATS ON SMART DEVICES
The weakest link in any IT curity chain is the ur. The human factor is the most challenging aspect of mobile device curity. Home urs generally assume that everything will work just as it should, relying on a device’s default ttings without referring to complex technical manuals. Therefore rvice content providers and hardware vendors need to be aware of their responsibilities in maintaining network curity and content management on the devices they provide. Service providers might also have the opportunity to provide add-on curity rvices to complement the weakness of the devices.

本文发布于:2023-07-08 17:25:31,感谢您对本站的认可!

本文链接:https://www.wtabcd.cn/fanwen/fan/82/1085899.html

版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。

标签:翻译   计算机科学   学生
相关文章
留言与评论(共有 0 条评论)
   
验证码:
推荐文章
排行榜
Copyright ©2019-2022 Comsenz Inc.Powered by © 专利检索| 网站地图