Skip to main content

A Literature Survey on Malware and Online Advertisement Hidden Hazards

  • Conference paper
  • First Online:
Intelligent Systems Technologies and Applications 2016 (ISTA 2016)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 530))

Abstract

Malware is a malignant code that expands over the connected frameworks in system. Malvertising is a malicious action that can distribute malware in different forms through advertising. Malware is the key of advertising and generate the revenue and for various Internet organizations, extensive advertisement systems; for example, Google, Yahoo and Microsoft contribute a ton of effort to moderate malicious advertising from their advertise network systems. This paper specifically discusses various types of detection techniques; procedures and analysis techniques for detect the malware threat. Malware detection method used to detect or identify the malicious activities so that malware could not harm the user system. Moreover the study includes about malicious advertising. This paper will look at the strategies utilized by adware as a part of their endeavours to stay inhabitant on the framework and analyze the sorts of information being separated from the client’s framework.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Imtithal A Saeed, Ali Selamat, Ali MA Abuagoub: A survey on malware and malware detection systems. International Journal of Computer Applications, 67(16), doi:10.5120/11480-7108.(2013)

  2. Xinyu Xing, Wei Meng, Byoungyoung Lee, Udi Weinsberg, Anmol Sheth, Roberto Perdisci, and Wenke Lee. Understanding malvertising through ad-injecting browser extensions, 2015.

    Google Scholar 

  3. Andrew H Sung, Jianyun Xu, Patrick Chavez, and Srinivas Mukkamala. Static analyzer of vicious executables. In Computer Security Applications Conference, 2004. 20th Annual, pages 326–334. IEEE, 2004.

    Google Scholar 

  4. Robin sharp. An introduction to malware, spring 2012

    Google Scholar 

  5. Nitin Padriya and Nilay Mistry. Review of behaviour malware analysis for android. International Journal of Engineering and Innovative Technology (IJEIT) Volume, 2, 2008.

    Google Scholar 

  6. Muazzam Ahmed Siddiqui. Data mining method for malware detection.Proquest,2008

    Google Scholar 

  7. Ammar Ahmed Elhadi, Mohd Aizaini Maarof, and Ahmed Hamza Osman. Malware detection based on hybrid signature behaviour application programming interface call graph. American journal of applied Science, 9(3):283,2012

    Google Scholar 

  8. Zahra Bazrafshan, Hossein Hashemi, Seyed Mehdi Hazrati Fard, and Ali Hamzeh. A survey on heuristic malware detection techniques. In Information and Knowledge Technology (IKT), 2013 5th Conference on, pages 113–120. IEEE, 2013.

    Google Scholar 

  9. Mila Dalla Preda, Mihai Christodorescu, Somesh Jha, and Saumya Debray. A semantics-based approach to malware detection. ACM Transactions on Programming Languages and Systems, 30(5):1–54, 2008.

    Google Scholar 

  10. Antarieu, F. et al., 2010, measuring the effectiveness of online advertising. Study conducted by PwC for IAB France and the Syndicat de Régies Internet, Paris.

    Google Scholar 

  11. Apostolis Zarras, Alexandros Kapravelos, Gianluca Stringhini, Thorsten Holz, Christopher Kruegel, and Giovanni Vigna. The dark alleys of Madison Avenue: Understanding malicious advertisements. In Proceedings of the 2014 Conference on Internet Measurement Conference, pages 373–380. ACM, 2014.

    Google Scholar 

  12. John Aycock. Spyware and Adware, volume 50. Springer Science & Business Media, 2010.

    Google Scholar 

  13. Eric Chien. Techniques of adware and spyware. In the Proceedings of the Fifteenth Virus Bulletin Conference, Dublin Ireland, volume 47, 2005.

    Google Scholar 

  14. Zarras, Apostolis, et al. “The dark alleys of Madison Avenue: Understanding malicious advertisements.” Proceedings of the 2014 Conference on Internet Measurement Conference. ACM, 2014.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priya Jyotiyana .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Jyotiyana, P., Maheshwari, S. (2016). A Literature Survey on Malware and Online Advertisement Hidden Hazards. In: Corchado Rodriguez, J., Mitra, S., Thampi, S., El-Alfy, ES. (eds) Intelligent Systems Technologies and Applications 2016. ISTA 2016. Advances in Intelligent Systems and Computing, vol 530. Springer, Cham. https://doi.org/10.1007/978-3-319-47952-1_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47952-1_35

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47951-4

  • Online ISBN: 978-3-319-47952-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics