Proactive Technique for Securing Smart Cities against Malware Attacks Using Static and Dynamic Analysis

Abstract

Cloud environment and IOT are the buzzwords in recent times. The smart devices connected with IOT enabled sensors generate a lot of data which is then uploaded on the cloud for further Analysis. The Internet of Things (IOT) is currently shaping our cities to take the form of a Smart City with a lot of connected, convenient, and intelligent systems working together in a collaborative and integrated manner. [1] However, this change brings minute insights into human activities through the ample data that is generated via sensors, devices etc. So, Security remains the major concern over the data collected from the smart devices, IOT sensors, social media, etc. The cyber-attacks which are taking a rise in the day to day digital life poses a major threat to the data generated from the smart city system. One of the security challenges is the malware attack. The malware poses a greater threat to the system which processes enormous critical data thereby resulting in the overall damage of the system with respect to confidentiality of the information. This paper proposes a method which can be used for malware analysis and detection, which in turn will combat the cyber security attack caused due to malware inclusion in the system. The paper focuses on different tools and techniques being used for malware analysis and detection. The approach will be able to safeguard the integrated system using IOT and Cloud with the help of Malware analysis.

Country : India

1 Ms. Purnima Ahirao

  1. Assistant Professor, K J Somaiya College of Engineering, Somaiya University, Maharashtra, India

IRJIET, Volume 5, Issue 2, February 2021 pp. 10-15

doi.org/10.47001/IRJIET/2021.502003

References

  1. Kalaikavitha, E., and Juliana Gnanaselvi. "Secure Login Using Encrypted One Time Password (OTP) and Mobile Based Login Methodology." International Journal of Engineering and Science 2, no. 10 (2013): 14-17.
  2. Giri, Debasis, and Parmeshwary Dayal Srivastava. "Cryptanalysis and improvement of a remote user authentication scheme using smart cards." In 2008 International Symposium on Electronic Commerce and Security, pp. 355-361. IEEE, 2008.
  3. Google, “Android Enterprise Security,” White Paper, 2018.
  4. https://sensiblemicro.com/smart-watches-the-start-of-the-wearable-electronics-revolution/
  5. THE SMARTWATCH MARKET: Growth, Consumer Attitudes, And Why This Is The New Device Category To Bet On, Tony Danova. Online available: https://www.businessinsider.in/THE-SMARTWATCH-MARKET-GrowthConsumer-Attitudes-And-Why-This-Is-The-New-Device-Category-ToBet-On/articleshow/45116246.cms
  6. Aloul, Fadi, Syed Zahidi, and Wassim El-Hajj. "Two factor authentication using mobile phones." In 2009 IEEE/ACS International Conference on Computer Systems and Applications, pp. 641-644. IEEE, 2009.
  7. Saurabh, "Advance Malware Analysis Using Static and Dynamic Methodology," 2018 International Conference on Advanced Computation and Telecommunication (ICACAT), Bhopal, India, 2018, pp. 1-5, doi: 10.1109/ICACAT.2018.8933769.
  8. https://subscription.packtpub.com/book/networking_and_servers/9781788392501/1/ch01lvl1sec13/4-types-of-malware-analysis