CFP last date
20 December 2024
Reseach Article

Malware Prevention and Detection System using Smart Phone

by Sachin M. Kolekar, Parikshit N. Mahalle
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 107 - Number 21
Year of Publication: 2014
Authors: Sachin M. Kolekar, Parikshit N. Mahalle
10.5120/19141-0142

Sachin M. Kolekar, Parikshit N. Mahalle . Malware Prevention and Detection System using Smart Phone. International Journal of Computer Applications. 107, 21 ( December 2014), 31-35. DOI=10.5120/19141-0142

@article{ 10.5120/19141-0142,
author = { Sachin M. Kolekar, Parikshit N. Mahalle },
title = { Malware Prevention and Detection System using Smart Phone },
journal = { International Journal of Computer Applications },
issue_date = { December 2014 },
volume = { 107 },
number = { 21 },
month = { December },
year = { 2014 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume107/number21/19141-0142/ },
doi = { 10.5120/19141-0142 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:41:41.493805+05:30
%A Sachin M. Kolekar
%A Parikshit N. Mahalle
%T Malware Prevention and Detection System using Smart Phone
%J International Journal of Computer Applications
%@ 0975-8887
%V 107
%N 21
%P 31-35
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile malware is a malicious software. This software used to disrupt computer operation. This paper surveys current state of mobile malware in the wild. Types of malware includingviruses,Trojans,Rootkits,Zombies,worms,Spyware,adware,spam,email and Denial Of Services(DOS) attaks. Survey the different types of operating system in different differ mobile. In this paper, we present the different types of malware detection techniques & discuss the smart phone security challenges.

References
  1. A. P. Felt et al. , "A Survey of Mobile Malware in the Wild,"Proc. ACM Workshop Security and Privacy in Mobile Devices(SPMD 11), ACM, 2011, pp. 3-14.
  2. Adebayo, Olawale Surajudeen, Mabayoje, Amit Mishra, Osho Oluwafemi, "Malware Detection, Supportive Software Agents and ItsClassification Schemes", International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 6, November 2012.
  3. T. Blasing et al. , "An Android Application Sandbox System for Suspicious Software Detection," Proc. 5th Int'l Conf. Malicious and Unwanted Software (Malware 10), ACM, 2010,pp. 55-62.
  4. M. Egele et al. , "A Survey on Automated Dynamic Malware Analysis Techniques and Tools," ACM ComputingSurveys,2012;https://www. seclab. tuwien. ac. at/papers/malware_survey. pdf.
  5. W. Enck et al. , "A Study of Android Application Security,"Proc. 20th Usenix Security Symp. , Usenix, 2011;http://static. usenix. org/events/sec11/tech/full_papers/Enck. pdf.
  6. IDC, "Mobile Phone Market Grows 17. 9% in Fourth Quarter, According to IDC," press release, 28 Jan. 2011; www. idc. com/about/viewpressrelease. jsp?containerId=prUS22679411.
  7. D. Barrera et al. , "A Methodology for Empirical Analysis of Permission-Based Security Models and Its Application to Android," Proc. 17th ACM Conf. Computer and Communications Security (CCS 10), ACM, 2010, pp. 73-84.
  8. A. D. Schmidt et al. , "Detecting Symbian OS Malware through Static Function Call Analysis," Proc. 4th Int'l Conf. Malicious and Unwanted Software (Malware 09), IEEE, 2009, pp. 15-22.
  9. M. Egele et al. , "PiOS: Detecting Privacy Leaks in iOS Applications,"Proc. ISOC Network and Distributed System Security Symp. (NDSS 11), ISOC, 2011; www. iseclab. org/papers/egele-ndss11. pdf.
Index Terms

Computer Science
Information Sciences

Keywords

Kirin security Cloud-base detection malware Access Contro spyware l prevention Decision table.