CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Prevention of Malicious Attack on Smart Phones using Amendment Capture Service

by S. Fouzul Hidhaya, Angelina Geetha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 89 - Number 15
Year of Publication: 2014
Authors: S. Fouzul Hidhaya, Angelina Geetha
10.5120/15709-4586

S. Fouzul Hidhaya, Angelina Geetha . Prevention of Malicious Attack on Smart Phones using Amendment Capture Service. International Journal of Computer Applications. 89, 15 ( March 2014), 31-35. DOI=10.5120/15709-4586

@article{ 10.5120/15709-4586,
author = { S. Fouzul Hidhaya, Angelina Geetha },
title = { Prevention of Malicious Attack on Smart Phones using Amendment Capture Service },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 89 },
number = { 15 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume89/number15/15709-4586/ },
doi = { 10.5120/15709-4586 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:09:21.169469+05:30
%A S. Fouzul Hidhaya
%A Angelina Geetha
%T Prevention of Malicious Attack on Smart Phones using Amendment Capture Service
%J International Journal of Computer Applications
%@ 0975-8887
%V 89
%N 15
%P 31-35
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Sensitive data and information is at a greater risk due to the exploitation of the smart phones by Malwares. Malwares that once targeted the computers are now fully designed to extract all the information possible from the mobile phones. This work focuses on preventing the malicious attack on the mobile phones by using Amendment capture service, which checks the smart phone periodically or when a change has taken place and executes the DtKFc algorithm to detect the malicious applications.

References
  1. http://www. checkmarx. com/2013/11/29/10-challenges-of-mobile-security/?goback=%2Egde_36874_member_5812209353184280577#%21
  2. http://www. infosecurity-magazine. com/view/30153/99-of-mobile-malware-targets-android/
  3. Buennemeyer, T. K. , Nelson T. M. , Clagett L. M. , Dunning J. P. , Marchany R. C. , Tront J. G. , 2008. Mobile device profiling and intrusion detection using smart batteries. In International conference on system sciences , p. 296–296.
  4. Bose,A. , Hu, X. , Shin, K. G. , Park, T. , 2008. Behavioral detection of malware on mobile handsets. In Proc. of the 6th international conference on mobile systems, applications, and services
  5. Asaf Shabtai , Uri Kanonov, Yuval Elovici, Chanan Glezer , Yael Weiss, 2012. "Andromaly": a behavioral malware detection framework for android devices, Journal of Intelligence Information Systems, 38,p. 161-190
  6. Menahem, E. , Shabtai, A. , Rokach, L. , & Elovici, Y. 2008. Improving malware detection by applying multi-inducer ensemble. Computational Statistics and Data Analysis, 53(4), 1483–1494.
  7. Garcia-Teodoro, P. , Diaz-Verdejo, J. , Macia-Fernandez, G. , & Vazquez, E. , 2009. Anomaly-based network intrusion detection: Techniques, systems and challenges. Computers & Security, 28(1–2), p. 18–28.
  8. Griffin, K. , Schneider, S. , Hu, X. , & Chiueh, T. , 2009. Automatic generation of string signatures for malware detection. In Proc. of the 12th international symposium on recent advances in intrusion detection.
  9. Adam, P. F. , Chaudhuri, A. , & Foster, J. S. , 2009. SCanDroid: Automated security certification of android applications. In proc. of IEEE symposium of security and privacy
  10. Shabtai, A. , Fledel, Y. , Kanonov, U. , Elovici, Y. , Dolev, S. , Glezer, C. ,. 2009 Google Android: A state-of-the-art review of security mechanisms. arXiv preprint arXiv:0912. 5101 .
  11. Shabtai, A. , Kanonov, U. , Elovici, Y. ,. 2010. Intrusion Detection on Mobile Devices Using the Knowledge Based Temporal-Abstraction Method. Journal of systems and Software. 83(8),p. 1524 -1537.
  12. A. Shabtai, Y. Fledel, Y. Elovici. , 2010. Securing Android-Powered Mobile Devices Using SELinux", IEEE Security and Privacy, 8(3),p. 36-44, http://doi. ieeecomputersociety. org/10. 1109/MSP. 2009. 144
  13. Aubrey-Derrick Schmidt , Frank Peters, Florian Lamour, Sahin Albayrak. 2009. Monitoring smart phones for anomaly detection. Mobile Networks and Applications 14(1), p. 92-106.
  14. Jacob, G. , Debar, H. , & Filiol, E. , 2008. Behavioral detection of malware: From a survey towards an established taxonomy. Journal in Computer Virology, 4, 251–266.
Index Terms

Computer Science
Information Sciences

Keywords

Android system Application Permission Android Security Malicious Applications Smart phone security