CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Prevention of Virus Propagation in Mobile Network

by Balasundaram.r, Ezhumalai.p, Balamurugan.g
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 102 - Number 2
Year of Publication: 2014
Authors: Balasundaram.r, Ezhumalai.p, Balamurugan.g
10.5120/17791-8587

Balasundaram.r, Ezhumalai.p, Balamurugan.g . Prevention of Virus Propagation in Mobile Network. International Journal of Computer Applications. 102, 2 ( September 2014), 44-47. DOI=10.5120/17791-8587

@article{ 10.5120/17791-8587,
author = { Balasundaram.r, Ezhumalai.p, Balamurugan.g },
title = { Prevention of Virus Propagation in Mobile Network },
journal = { International Journal of Computer Applications },
issue_date = { September 2014 },
volume = { 102 },
number = { 2 },
month = { September },
year = { 2014 },
issn = { 0975-8887 },
pages = { 44-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume102/number2/17791-8587/ },
doi = { 10.5120/17791-8587 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:32:06.765167+05:30
%A Balasundaram.r
%A Ezhumalai.p
%A Balamurugan.g
%T Prevention of Virus Propagation in Mobile Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 102
%N 2
%P 44-47
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Infections and malwares have the capacity to spread beginning workstation systems into versatile systems with the fast improvement of brilliant phone clients . Currently, there are three disease vectors utilized by portable malware to spoil versatile. A Bluetooth affiliation permits document exchange if the telephone's Bluetooth stack helps OBEX trade - which most telephones do. MMS messages can encase not just sound and pictures, they can additionally convey executables. Some cell telephone infections utilize this disease vector excessively - e. g. , the infections from the Commwarrior precursors. It's simpler to reject a MMS message than it is to decline a Bluetooth record sending, in light of the fact that the interest comes earlier. In any case, the message by and large originates from some individual you know, as the infection sends itself to the cell telephone on the tainted telephone's phonebook - in this way, you're more prone to open it. Finally, in the event that you embed a contaminated MMC card into your telephone, different projects on it can mechanically execute. This defilement vector is likewise utilized by the Commwarrior infection family. These are the contamination vectors as of now being used. The correspondence channel that could be utilized to exchange executable substance might be utilized to send an infection. These comprise of Wi-Fi interchanges, skimming the Web, synchronizing with a contaminated PC etc. We propose a two-layer system model for mimicking infection spread through in participation of Bluetooth and SMS. We examine two methods for controlling portable infection engendering. The primary method is pre immunization and versatile scattering systems.

References
  1. D. -H. Shi, B. Lin, H. -S. Chiang and M. -H. Shih, "Security aspects of mobile phone virus: A critical survey," Industrial Management and Data System, vol. 108, no. 4, pp. 478–494, 2008.
  2. H. Kim, J. Smith, and K. G. Shin, "Detecting energy-greedy anomalies and mobile malware variants," Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys08), pp. 239–252, 2008.
  3. L. Xie, H. Song, T. Jaeger, and S. Zhu, "A systematic approach for cell-phone worm containment," Proceedings of the 17th International World Wide Web Conference (WWW08), pp. 1083–1084, 2008.
  4. N. Xu, F. Zhang, Y. Luo, W. Jia, D. Xuan, and J. Teng, "Stealthy video capture: A new video-based spyware in 3G smart phones," Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec09), pp. 69–78, 2009.
  5. G. Yan and S. Eidenbenz, "Modeling propagation dynamics of Bluetooth worms (extended version)," IEEE Transactions on Mobile Computing, vol. 8, no. 3, pp. 353–367, 2009.
  6. C. Gao, J. Liu, and N. Zhong, "Network immunization and virus propagation in email networks: experimental evaluation and analysis," Knowledge and Information Systems, vol. 27, no. 2, pp. 253–279, 2011.
  7. P. Wang, M. C. Gonzalez, C. A. Hidalgo, and A. -L. Barabasi,"Understanding the spreading patterns of mobile phone viruses, "Science, vol. 324, no. 5930, pp. 1071–1076, 2009.
  8. S. Cheng,W. C. Ao, P. Chen, and K. Chen, "On modeling malware propagation in generalized social networks," IEEE Communications Letters, vol. 15, no. 1, pp. 25–27, 2011.
  9. P. De, Y. Liu, and S. K. Das, "An epidemic theoretic framework for vulnerability analysis of broadcast protocols in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 8,no. 3,pp. 413–425, 2009.
  10. P. De, Y. Liu, and S. K. Das, "Deployment aware modeling of node compromise spread in wireless sensor networks using epidemic theory," ACM Transactions on Sensor Networks,vol. 5,no. 3,pp. 1–33, 2009.
  11. M. C. Gonzalez, C. A. Hidalgo, and A. L. Barabasi, "Understanding individual human mobility patterns," Nature, vol. 453, no. 7196, pp. 779–782, 2008.
  12. C. C. Zou, D. Towsley, and W. Gong, "Modeling and simulation study of the propagation and defense of internet e-mail worms,"IEEE Transaction on Dependable and Secure Computing, vol. 4, no. 2, pp. 105–118, 2007.
  13. L. Xie, X. Zhang, A. Chaugule, T. Jaeger, and S. Zhu, "Designing system-level defenses against cellphone malware," Proceedings of the 28th IEEE International Symposium on Reliable Distributed Systems (SRDS09), pp. 83–90, 2009.
  14. A. Bose, X. Hu, K. G. Shin, and T. Park, "Behavioral detection of malware on mobile handsets," Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys08),pp. 225–238, 2008.
  15. F. Li, Y. Yang, and J. Wu, "CPMC: An efficient proximity malware coping scheme in Smartphone-based mobile networks, "Proceedings of the 29th IEEE International Conference on Computer Communication (INFOCOM10), pp. 2811–2819, 2010.
  16. G. Zyba,G. M. Voelker,M. Liljenstam,A. Mehes,andP. Johansson, "Defending mobile phones from proximity malware, "Proceedings of the 28th IEEE International Conference on Computer Communication (INFOCOM09), pp. 1503–1511, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Bluetooth I-Fi SMS MMS PC MMC BT-Based