Research Article

Malware Prevention and Detection System using Smart Phone

by  Sachin M. Kolekar, Parikshit N. Mahalle
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Issue 21
Published: December 2014
Authors: Sachin M. Kolekar, Parikshit N. Mahalle
10.5120/19141-0142
PDF

Sachin M. Kolekar, Parikshit N. Mahalle . Malware Prevention and Detection System using Smart Phone. International Journal of Computer Applications. 107, 21 (December 2014), 31-35. DOI=10.5120/19141-0142

                        @article{ 10.5120/19141-0142,
                        author  = { Sachin M. Kolekar,Parikshit N. Mahalle },
                        title   = { Malware Prevention and Detection System using Smart Phone },
                        journal = { International Journal of Computer Applications },
                        year    = { 2014 },
                        volume  = { 107 },
                        number  = { 21 },
                        pages   = { 31-35 },
                        doi     = { 10.5120/19141-0142 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2014
                        %A Sachin M. Kolekar
                        %A Parikshit N. Mahalle
                        %T Malware Prevention and Detection System using Smart Phone%T 
                        %J International Journal of Computer Applications
                        %V 107
                        %N 21
                        %P 31-35
                        %R 10.5120/19141-0142
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile malware is a malicious software. This software used to disrupt computer operation. This paper surveys current state of mobile malware in the wild. Types of malware includingviruses,Trojans,Rootkits,Zombies,worms,Spyware,adware,spam,email and Denial Of Services(DOS) attaks. Survey the different types of operating system in different differ mobile. In this paper, we present the different types of malware detection techniques & discuss the smart phone security challenges.

References
  • A. P. Felt et al. , "A Survey of Mobile Malware in the Wild,"Proc. ACM Workshop Security and Privacy in Mobile Devices(SPMD 11), ACM, 2011, pp. 3-14.
  • Adebayo, Olawale Surajudeen, Mabayoje, Amit Mishra, Osho Oluwafemi, "Malware Detection, Supportive Software Agents and ItsClassification Schemes", International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 6, November 2012.
  • T. Blasing et al. , "An Android Application Sandbox System for Suspicious Software Detection," Proc. 5th Int'l Conf. Malicious and Unwanted Software (Malware 10), ACM, 2010,pp. 55-62.
  • M. Egele et al. , "A Survey on Automated Dynamic Malware Analysis Techniques and Tools," ACM ComputingSurveys,2012;https://www. seclab. tuwien. ac. at/papers/malware_survey. pdf.
  • W. Enck et al. , "A Study of Android Application Security,"Proc. 20th Usenix Security Symp. , Usenix, 2011;http://static. usenix. org/events/sec11/tech/full_papers/Enck. pdf.
  • IDC, "Mobile Phone Market Grows 17. 9% in Fourth Quarter, According to IDC," press release, 28 Jan. 2011; www. idc. com/about/viewpressrelease. jsp?containerId=prUS22679411.
  • D. Barrera et al. , "A Methodology for Empirical Analysis of Permission-Based Security Models and Its Application to Android," Proc. 17th ACM Conf. Computer and Communications Security (CCS 10), ACM, 2010, pp. 73-84.
  • A. D. Schmidt et al. , "Detecting Symbian OS Malware through Static Function Call Analysis," Proc. 4th Int'l Conf. Malicious and Unwanted Software (Malware 09), IEEE, 2009, pp. 15-22.
  • M. Egele et al. , "PiOS: Detecting Privacy Leaks in iOS Applications,"Proc. ISOC Network and Distributed System Security Symp. (NDSS 11), ISOC, 2011; www. iseclab. org/papers/egele-ndss11. pdf.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Kirin security Cloud-base detection malware Access Contro spyware l prevention Decision table.

Powered by PhDFocusTM