CFP last date
20 January 2025
Reseach Article

An Improved the Optimal Distributed Dummy Signature for Malicious Software in Mobile Network

by Ashvini Bhatkal, R.N. Phursule
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 123 - Number 15
Year of Publication: 2015
Authors: Ashvini Bhatkal, R.N. Phursule
10.5120/ijca2015905717

Ashvini Bhatkal, R.N. Phursule . An Improved the Optimal Distributed Dummy Signature for Malicious Software in Mobile Network. International Journal of Computer Applications. 123, 15 ( August 2015), 18-22. DOI=10.5120/ijca2015905717

@article{ 10.5120/ijca2015905717,
author = { Ashvini Bhatkal, R.N. Phursule },
title = { An Improved the Optimal Distributed Dummy Signature for Malicious Software in Mobile Network },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 123 },
number = { 15 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 18-22 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume123/number15/22035-2015905717/ },
doi = { 10.5120/ijca2015905717 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:12:47.458647+05:30
%A Ashvini Bhatkal
%A R.N. Phursule
%T An Improved the Optimal Distributed Dummy Signature for Malicious Software in Mobile Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 123
%N 15
%P 18-22
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Now a day the world is mobile and internet oriented, each and every person must have the both of things. While in using the mobile and internet we have to face many problems such as malware attacks in while in sending and receiving message. We consider a malware attack in sending an MMS and Bluetooth. We found many problems while sending message we used distributed algorithm and dummy signature to protect the message from malware [3].In mobile network malware attacks frequently occur while sending and receiving information [2]. Develop an efficient system to protect infection and infected nodes to recover and produce dummy signature to overcome of spreading and outbreaks of malware [1]. We found that the problem is how to optimally distribute content- based signature of malware, that help to detect malware and disable further propagation to minimize the no of infected nodes[4]. we can go through two different approaches 1. MMS 2. Bluetooth. In MMS a malware send a copy of itself to all devices whose numbers are found in address book of infected device. We use optimal distributed solution to efficiently avoid malware spreading and apply dummy signature to help infected nodes to recover [1].

References
  1. “Optimal Distributed Malware Defense in Mobile Networks with Heterogeneous Devices”
  2. Yong Li, Member, IEEE, Pan Hui , Member, IEEE, Depeng Jin, Member, IEEE, Li Su, and Lieguang Zeng, Member, IEEE
  3. P. Wang, M. Gonzalez, C. Hidalgo, and A. Barabasi , “Understanding the Spreading Patterns of Mobile Phone Viruses,” Science, vol. 324, no. 5930, pp. 1071-1076, 2009.
  4. M. Hypponen, “Mobile Malware,” Proc. 16th USENIX Security Symp. , 2007.
  5. G. Lawton, “On the Trail of the Conficker Worm,” Computer, vol. 42, no. 6, pp. 19-22, June 2009.
  6. M. Khouzani , S . Sarkar , and E. Altman, “Maximum Damage Malware Attack in Mobile Wireless Networks,” Proc. IEEE INFOCOM, 2010. 390 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 2, FEBRUARY 2014
  7. Z . Zhu , G. Cao , S. Zhu, S. Ranjan , and A. Nucci , “A Social Network Based Patching Scheme for Worm Containment in Cellular Networks,” Proc. IEEE INFOCOM, 2009.
  8. G. Zyba , G. Voelker, M. Liljenstam, A. Mahesh, and P. Johansson, “Defending Mobile Phones from Proximity Malware,” Proc. IEEEINFOCOM, 2009
  9. F. Li, Y. Yang, and J. Wu, “CPMC: An Efficient Proximity Malware Coping Scheme in Smartphone-Based Mobile Networks,” Proc.IEEE INFOCOM, 2009.
  10. P. Bremaud, Markov Chains: Gibbs Fields, Monte Carlo Simulation, and Queues. Springer Verlag, 1999.
  11. M. Grossglauser and D. Tse, “Mobility Increases The Capacity of Ad-Hoc Wireless Networks,” Proc. IEEE INFOCOM, pp. 1360-1369, 2001.
Index Terms

Computer Science
Information Sciences

Keywords

distributed algorithm heterogeneous mobile networks mobile malware Security threat