ACL(Access Control List)即访问控制列表,是路由器或交换机接口的指令列表,用来控制端口进出的数据包。在企业通信中,为了防止企业员工上班时间访问休闲娱乐网站而影响工作效率,或者上班时间访问不安全网站引起内部网络安全问题,需要...ACL(Access Control List)即访问控制列表,是路由器或交换机接口的指令列表,用来控制端口进出的数据包。在企业通信中,为了防止企业员工上班时间访问休闲娱乐网站而影响工作效率,或者上班时间访问不安全网站引起内部网络安全问题,需要通过安全策略来保障非授权用户无法访问特定的网络资源,从而达到访问控制的目的。ACL规则可以控制设备访问、指定转发特定端口数据包,防止破坏系统安全。测试结果表明,配置ACL规则可以有效控制访问者权限,保证网络安全。展开更多
In recent days the usage of android smartphones has increased exten-sively by end-users.There are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many mor...In recent days the usage of android smartphones has increased exten-sively by end-users.There are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many more applications.The android stack is more vulnerable compared to other mobile plat-forms like IOS,Windows,or Blackberry because of the open-source platform.In the Existing system,malware is written using vulnerable system calls to bypass signature detection important drawback is might not work with zero-day exploits and stealth malware.The attackers target the victim with various attacks like adware,backdoor,spyware,ransomware,and zero-day exploits and create threat hunts on the day-to-day basics.In the existing approach,there are various tradi-tional machine learning classifiers for building a decision support system with limitations such as low detection rate and less feature selection.The important contents taken for building model from android applications like Intent Filter,Per-mission Signature,API Calls,and System commands are taken from the manifestfile.The function parameters of various machine and deep learning classifiers like Nave Bayes,k-Nearest Neighbors(k-NN),Support Vector Machine(SVM),Ada Boost,and Multi-Layer Perceptron(MLP)are done for effective results.In our pro-posed work,we have used an unsupervised learning multilayer perceptron with multiple target labels and built a model with a better accuracy rate compared to logistic regression,and rank the best features for detection of applications and clas-sify as malicious or benign can be used as threat model by online antivirus scanners.展开更多
In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blac...In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blackberry, Android has captured the highest percentage of total market share [1]. Due to this tremendous growth, cybercriminals are encouraged to penetrate various mobile marketplaces with malicious applications. Most of these applications require device information permissions aiming to collect sensitive data without user’s consent. This paper investigates each element of system information permissions and illustrates how cybercriminals can harm users’ privacy. It presents some attack scenarios using READ_PHONE_STATE permission and the risks behind it. In addition, this paper refers to possible attacks that can be performed when additional permissions are combined with READ_PHONE_STATE permission. It also discusses a proposed solution to defeat these types of attacks.展开更多
文摘ACL(Access Control List)即访问控制列表,是路由器或交换机接口的指令列表,用来控制端口进出的数据包。在企业通信中,为了防止企业员工上班时间访问休闲娱乐网站而影响工作效率,或者上班时间访问不安全网站引起内部网络安全问题,需要通过安全策略来保障非授权用户无法访问特定的网络资源,从而达到访问控制的目的。ACL规则可以控制设备访问、指定转发特定端口数据包,防止破坏系统安全。测试结果表明,配置ACL规则可以有效控制访问者权限,保证网络安全。
文摘In recent days the usage of android smartphones has increased exten-sively by end-users.There are several applications in different categories bank-ing/finance,social engineering,education,sports andfitness,and many more applications.The android stack is more vulnerable compared to other mobile plat-forms like IOS,Windows,or Blackberry because of the open-source platform.In the Existing system,malware is written using vulnerable system calls to bypass signature detection important drawback is might not work with zero-day exploits and stealth malware.The attackers target the victim with various attacks like adware,backdoor,spyware,ransomware,and zero-day exploits and create threat hunts on the day-to-day basics.In the existing approach,there are various tradi-tional machine learning classifiers for building a decision support system with limitations such as low detection rate and less feature selection.The important contents taken for building model from android applications like Intent Filter,Per-mission Signature,API Calls,and System commands are taken from the manifestfile.The function parameters of various machine and deep learning classifiers like Nave Bayes,k-Nearest Neighbors(k-NN),Support Vector Machine(SVM),Ada Boost,and Multi-Layer Perceptron(MLP)are done for effective results.In our pro-posed work,we have used an unsupervised learning multilayer perceptron with multiple target labels and built a model with a better accuracy rate compared to logistic regression,and rank the best features for detection of applications and clas-sify as malicious or benign can be used as threat model by online antivirus scanners.
文摘In the age of smartphones, people do most of their daily work using their smartphones due to significant improvement in smartphone technology. When comparing different platforms such as Windows, iOS, Android, and Blackberry, Android has captured the highest percentage of total market share [1]. Due to this tremendous growth, cybercriminals are encouraged to penetrate various mobile marketplaces with malicious applications. Most of these applications require device information permissions aiming to collect sensitive data without user’s consent. This paper investigates each element of system information permissions and illustrates how cybercriminals can harm users’ privacy. It presents some attack scenarios using READ_PHONE_STATE permission and the risks behind it. In addition, this paper refers to possible attacks that can be performed when additional permissions are combined with READ_PHONE_STATE permission. It also discusses a proposed solution to defeat these types of attacks.