CFP last date
20 January 2025
Reseach Article

Securing Mobile Devices in a Wireless Network using Improved Application Whitelisting Technique

by Nantomah Ibrahim
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 13
Year of Publication: 2018
Authors: Nantomah Ibrahim
10.5120/ijca2018916164

Nantomah Ibrahim . Securing Mobile Devices in a Wireless Network using Improved Application Whitelisting Technique. International Journal of Computer Applications. 179, 13 ( Jan 2018), 18-23. DOI=10.5120/ijca2018916164

@article{ 10.5120/ijca2018916164,
author = { Nantomah Ibrahim },
title = { Securing Mobile Devices in a Wireless Network using Improved Application Whitelisting Technique },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2018 },
volume = { 179 },
number = { 13 },
month = { Jan },
year = { 2018 },
issn = { 0975-8887 },
pages = { 18-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number13/28860-2018916164/ },
doi = { 10.5120/ijca2018916164 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:55:15.836014+05:30
%A Nantomah Ibrahim
%T Securing Mobile Devices in a Wireless Network using Improved Application Whitelisting Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 13
%P 18-23
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile devices have fast become tools used for various business transactions these days. What many do not know is that these mobile devices are more prone to attacks than the desktop and laptop computers. This research work proposes application whitelisting as the surest way of minimizing these attacks and malware infections to the barest minimum. To this end, a system has been designed to implement whitelisting where only trusted applications are allowed to run while blocking any other application (which may include malware). A detailed description of how the proposed system works has be discussed. A test was conducted after developing the system. From the test conducted, applications that were listed under the whitelist were permitted to run. However, an attempt to run an application outside the whitelist showed a message on the screen indicating that the application is not permitted to run which is an indication that the proposed application is working perfectly. The proposed application is also easy to install and configure and comes with just one setup unlike other whitelisting applications such as Bit9 Parity and McAfee Application Control. From all indications, whitelisting seem to be the better solution to securing these unsecured mobile devices against the overwhelming malware.

References
  1. Sophos. (2010, May 24). Retrieved February 10, 2015, from http://www.flickr.com/photos/50473116@N05/.
  2. Brian, K. (2010, August 5). crimepack-packed with hard lessons. Retrieved from http://krebsonsecurity.com/2010/08/crimepack-packedwith-hard-lessons/
  3. PandaLabs. (2011). Anual Security Report. Califonia: The Sacramento Bee.
  4. NIST. (2013). Guidelines for managing the security of mobile devices in the enterprise. .
  5. Micro, T. (2013, January 28). Repeating history. Retrieved March 7, 2015, from http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/reports/rpt-repeating-history.pdf
  6. Ruggiero, P., & Foote, J. (2011). Cyber threats to mobile phones . United States Computer Emergency Readiness Team.
  7. NSA Guide. (2010). Application whitelisting using software restriction policies.
  8. Liang, C., Machiraju, s., & Chen, H. (2009, August 17). Defending against sensor-sniffing attacks on mobile phones. Mobiheld, 31-36.
  9. Pareek, H., Romana, S., & Eswari, P. (2012). Application whitelisting approaches and challenge. International Journal of Computer Science Engineering and Information Technology, 13-18.
  10. Carvey, H. (2007). Windows forensic analysis toolkit. Burlington, MA: Syngress Publishing Inc.
  11. Federal Trade Commission. (2009, June 25). Ftc settles with two defendants in bogus computer scan case. Retrieved from http://www.ftc.gov/opa/2009/06/winsoftware.shtm
  12. Egele, M., Kirda, E., & Kruegel, C. (2009). Mitigating drive-by download attacks: chanllenges and open problems. Open research problems in network security (p. seclab.nu/static/publications/inetsec2009dbd.pdf). Berlin: Springer.
  13. Liston, K. (2010, November 3). SANS ISE InfoSec Forums. Retrieved from https://isc.sans.edu/forums/diary/Defeating+Driveby+Downloads+in+Windows/9880/
Index Terms

Computer Science
Information Sciences

Keywords

Whitelisting application whitelisting.