Mobile Spyware Identification and Categorization: A Systematic Review

IF 3.3 4区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS
Muawya Naser, Hussein Albazar, Hussein Abdel-Jaber
{"title":"Mobile Spyware Identification and Categorization: A Systematic Review","authors":"Muawya Naser, Hussein Albazar, Hussein Abdel-Jaber","doi":"10.31449/inf.v47i8.4881","DOIUrl":null,"url":null,"abstract":"Smartphones have revolutionized the way we live, work, and interact with the world. They have become indispensable companions, seamlessly integrating into our daily routines. However, with this pervasive usage comes a growing security concern. Mobile phones are increasingly becoming targets of cyber-attacks, with more than 26,000 attacks happening daily. Among these threats, spyware is one of the most prevalent and insidious threat. Researchers have explored various techniques for identifying and categorizing mobile spyware to address this issue. These efforts are crucial for enhancing the security of our mobile devices and protecting our sensitive data from prying eyes. In this paper, we have conducted a comprehensive survey of the existing techniques and summarized their strengths and limitations. Our analysis encompasses a range of approaches, from signature-based detection to machine learning-based classification. We also explore the latest advancements in behavioral analysis and intrusion detection systems. By consolidating this knowledge, we provide a valuable reference point for future research on mobile spyware detection and prevention. In conclusion, this paper highlights mobile security’s critical role in our digital lives. It underscores the importance of ongoing research and innovation in mobile security to safeguard our personal information and prevent cyber-attacks.","PeriodicalId":56292,"journal":{"name":"Informatica","volume":"237 1","pages":"0"},"PeriodicalIF":3.3000,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Informatica","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31449/inf.v47i8.4881","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Smartphones have revolutionized the way we live, work, and interact with the world. They have become indispensable companions, seamlessly integrating into our daily routines. However, with this pervasive usage comes a growing security concern. Mobile phones are increasingly becoming targets of cyber-attacks, with more than 26,000 attacks happening daily. Among these threats, spyware is one of the most prevalent and insidious threat. Researchers have explored various techniques for identifying and categorizing mobile spyware to address this issue. These efforts are crucial for enhancing the security of our mobile devices and protecting our sensitive data from prying eyes. In this paper, we have conducted a comprehensive survey of the existing techniques and summarized their strengths and limitations. Our analysis encompasses a range of approaches, from signature-based detection to machine learning-based classification. We also explore the latest advancements in behavioral analysis and intrusion detection systems. By consolidating this knowledge, we provide a valuable reference point for future research on mobile spyware detection and prevention. In conclusion, this paper highlights mobile security’s critical role in our digital lives. It underscores the importance of ongoing research and innovation in mobile security to safeguard our personal information and prevent cyber-attacks.
移动间谍软件识别与分类:系统综述
智能手机已经彻底改变了我们生活、工作和与世界互动的方式。它们已经成为我们不可或缺的伙伴,无缝地融入了我们的日常生活。然而,随着这种普遍使用,安全问题也日益严重。手机越来越成为网络攻击的目标,每天发生的攻击超过2.6万起。在这些威胁中,间谍软件是最普遍和最隐蔽的威胁之一。研究人员已经探索了各种识别和分类移动间谍软件的技术来解决这个问题。这些努力对于增强我们移动设备的安全性和保护我们的敏感数据免受窥探至关重要。在本文中,我们对现有的技术进行了全面的调查,并总结了它们的优势和局限性。我们的分析涵盖了一系列方法,从基于签名的检测到基于机器学习的分类。我们还探讨了行为分析和入侵检测系统的最新进展。通过巩固这些知识,我们为未来移动间谍软件检测和预防的研究提供了有价值的参考点。总之,本文强调了移动安全在我们的数字生活中的关键作用。它强调了正在进行的移动安全研究和创新对于保护我们的个人信息和防止网络攻击的重要性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Informatica
Informatica 工程技术-计算机:信息系统
CiteScore
5.90
自引率
6.90%
发文量
19
审稿时长
12 months
期刊介绍: The quarterly journal Informatica provides an international forum for high-quality original research and publishes papers on mathematical simulation and optimization, recognition and control, programming theory and systems, automation systems and elements. Informatica provides a multidisciplinary forum for scientists and engineers involved in research and design including experts who implement and manage information systems applications.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信