外文翻译-计算机科学与技术.doc
《外文翻译-计算机科学与技术.doc》由会员分享,可在线阅读,更多相关《外文翻译-计算机科学与技术.doc(92页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Four short words sum up what has lifted most successful individuals above the crowd: a little bit more.-author-date外文翻译-计算机科学与技术The Three-Tier Architecture毕业设计(论文)外文文献翻译专业计算机科学与技术学生姓名班级学号指导教师信 息 工 程 学 院Mobile Malware and Smart Device Security:Trends, Challenges and Solutions Abdullahi Arabo and Bern
2、ardi PranggonoThe Oxford Internet Institute (OII), Oxford University, Oxford, OX1 3JS, U.K.School of Engineering and Built Environment, Glasgow Caledonian University, Glasgow, G4 0BA, U.K.Abstract This work is part of the research to study trends and challenges of cyber security to smart devices in
3、smart homes. We have seen the development and demand for seamless interconnectivity of smart devices to provide various functionality and abilities to users. While these devices provide more features and functionality, they also introduce new risks and threats. Subsequently, current cyber security i
4、ssues related to smart devices are discussed and analyzed. The paper begins with related background and motivation. We identified mobile malware as one of the main issue in the smart devices security. In the near future, mobile smart device users can expect to see a striking increase in malware and
5、notable advancements in malware-related attacks, particularly on the Android platform as the user base has grown exponentially. We discuss and analyzed mobile malware in details and identified challenges and future trends in this area. Then we propose and discuss an integrated security solution for
6、cyber security in smart devices to tackle the issue.Index Botnet, cyber security, mobile malware, security framework, smart device securityI. INTRODUCTIONThe Internet is one of the most remarkable developments to have happened to mankind in the last 100 years. The development of ubiquitous computing
7、 makes things even more interesting as it has given us the possibility to utilise devices and technology in unusual ways. We have seen the development and demand for seamless interconnectivity of smart devices to provide various functionalities and abilities to users. But we also know the vulnerabil
8、ities that exist within this ecosystem. However, these vulnerabilities are normally considered for larger infrastructures and little attention has been paid to the cyber security threats from the usage and power of smart devices as a result of the Internet of Things (IoT) technologies. In the IoT vi
9、sion, every physical object has a virtual component that can produce and consume services. Smart spaces are becoming interconnected with powerful smart devices (smartphones, tablets, etc.). On the other hand, we also have the backbone, the power grid that powers our nations. These two phenomena are
10、coming at the same time. The increased usage of smart meters in our homes or businesses provides an avenue of connectivity as well as powerful home services or interconnected powerful smart devices. The example of the smart grid also provides the means of controlling and monitoring smart grid infras
11、tructures via the use of portable smart devices.The vulnerability of the connected home and developments within the energy industrys new wireless smart grid are exposed to the wrong people; it will inevitably lead to lights out for everyone. This will eventually uncover the multitude of interconnect
12、ed smart devices in the IoT as a hotbed for cyber-attacks or robot networks (botnets) and a security nightmare for smart space users and possibly for national infrastructures as a whole.The latest research has reported that on average people own three internet-connected smart devices such as smartph
13、ones and tablets. Therefore, as a result of the ubiquity of smart devices, and their evolution as computing platforms, as well as the powerful processors embedded in smart devices, has made them suitable objects for inclusion in a botnet. Botnets of mobile devices (also known as mobile botnets) are
14、a group of compromised smart devices that are remotely controlled by bot-masters via command-and-control (C&C) channels. Mobile botnets have different characteristics in several aspects as compared to PC-based botnets, such as their C&C channels medium.PC-based botnets are seen as the most common pl
15、atforms for security attacks, and mobile botnets are seen as less of a threat in comparison to their counterparts. This is so for different reasons, such as limited battery power, resource issues, and Internet access constraints, etc. Therefore, the efforts directed to both the manifestation of oper
16、ating mobile botnets and corresponding research and development endeavours are not as wide as for PC-based botnets. However, this development could change with the recent surge in popularity and use of smart devices. Smart devices are now widely used by billions of users due to their enhanced comput
17、ing ability, practicality and efficient Internet access, thanks to advancement in solid-state technologies.Moreover, smart devices typically contain a large amount of sensitive personal and corporate data and are often used in online payments and other sensitive transactions. The wide spread use of
18、open-source smart device platforms such as Android and third-party applications made available to the public also provides more opportunities and attractions for malware creators. Therefore, for now and the near future smart devices will become one of the most lucrative targets for cybercriminals.Th
19、e main focus of this paper is threefold: firstly to highlight the possible threats and vulnerability of smart devices, secondly to analyse the challenges involved in detecting mobile malware in smart devices and finally to propose a general security solution that will facilitate solving or addressin
20、g such threats. The rest of the paper is organized as follows. In section II we provide a detailed analysis of the security threats on smart devices and their links with cyber security. We have identified mobile malware as one of the main issues and we discuss it in more detail in Section III. Secti
21、on IV provides our proposed security solution that will be able to deter the problems of mobile malware. The paper is concluded in section V.II. SECURITY THREATS ON SMART DEVICESThe weakest link in any IT security chain is the user. The human factor is the most challenging aspect of mobile device se
22、curity. Home users generally assume that everything will work just as it should, relying on a devices default settings without referring to complex technical manuals. Therefore service content providers and hardware vendors need to be aware of their responsibilities in maintaining network security a
23、nd content management on the devices they provide. Service providers might also have the opportunity to provide add-on security services to complement the weaknesses of the devices.The issue of cyber security is much closer to the home environment than has been usually understood; hence, the problem
24、 of cyber security extends beyond computers it is also a threat to portable devices. Many electronic devices used at home are practically as powerful as a computer - from mobile phones, video consoles, game consoles and car navigation systems. While these devices are portable, provide more features
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 外文 翻译 计算机科学 技术
限制150内