Implementation of Mobile Malware

Sonal Mohite, Reshma S. Sonar

Abstract


In wireless eon mobile phones have turn out to be the integral part of every human communication. As a result, the computer malware is now drifting from computers to mobile phones. The purpose of this paper is to demonstrate the Bluetooth & SMS based mobile malware propagation, cloud based detection of both the malwares & at last, control the malware propagation. Mobile malware propagates via two communication channels viz. Bluetooth/Wi-Fi, and SMS/MMS. BT based malware propagates in geometric proximity and thus has a short range spreading pattern. SMS-based malware propagation has a long-range spreading pattern. SMS-based malwares are dangerous when it comes to speed and scope of propagation. When a message is sent from one device to another device, suspicious activity logs are sent to cloud server. When some predefined numbers of logs come from a specific device & signature matches, then that device is declared as malicious or attacker. In this way, signature based malware detection implemented on cloud is used to detect malware. Malicious device’s details are sent back to mobile network in the form of patch. This patch prevents other devices from receiving the message sent by attacker. The ultimate aim of this paper is to analyze the speed and severity of mobile malware before it comes into reality.


Full Text:

PDF

References


Gao, C., and Liu, J. (2013). Modeling and Restraining Mobile Virus Propagation. IEEE transactions on mobile computing, 12(3), 529-541.

Gao, C., and Liu, J. (2013). Modeling and Restraining Mobile Virus Propagation. (Supplementary File), IEEE Trans. Mobile Computing.

Mohite, S., and Sonar, R.S. (October 2013-April 2014). Proliferation, Detection, and Suppression of Mobile Malware. Cyber Times International Journal of Technology and

Management, ISSN: 2278- 7518, Volume 7, Issue 1, Page No. 129-134.

Cheng, S., Ao, W.C., Chen, P., Chen, K. (Jan. 2011). On Modeling Malware Propagation in Generalized Social Network, IEEE Comm. Letters, vol. 15, no. 1, pp. 25-27.

Yan, G., and Eidenbenz, S. (March 2009). Modeling Propagation Dynamics of Bluetooth Worms (extended version). IEEE transactions on Mobile Computing, 8(3), 353-368.

Meng, X., Zerfos, P., Samanta, V., Wong, S.H., and Lu, S. (2007). Analysis of the Reliability of a Nationwide Short Message Service. Proc. IEEE INFOCOM, pp. 1811-1819.

Gao, C., Liu, J., and Zhong, N. (2011). Network Immunization and Virus Propagation in Email Networks: Experimental Evaluation and Analysis. Knowledge and Information Systems, vol. 27, no. 2, pp. 253-279.

Gao, C., Liu, J., and Zhong, N. (July 2011). Network Immunization with Distributed Autonomy-Oriented Entities. IEEE Trans. Parallel and Distributed Systems, vol. 22, no. 7, pp. 1222-1229.

Wang, P., Gonzalez, M.C., Hidalgo, C.A., and Barabasi, A.L. (2009). Understanding the Spreading Patterns of Mobile Phone Viruses. Science, vol. 324, no. 5930, pp. 1071-1076.


Refbacks

  • There are currently no refbacks.


ISSN: 1694-2507 (Print)

ISSN: 1694-2108 (Online)