Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Restriction of Mobile Viruses Using Pre- Immunization and Adaptive Dissemination  
  Authors : Priti Naik
  Cite as:

 

Viruses and malwares can spread can spread from PC systems into versatile systems with the fast development of shrewd mobile phone clients. In a portable system, infections and malwares can result in protection information spillage, additional charges, and remote tuning in. Moreover, they can stick remote servers by sending a huge number of spam messages or track client positions through GPS. On account of the potential harms of portable infections, it is critical for us to pick up a profound understanding of the spread instruments of versatile infections. We propose a network model for simulating virus propagation through both Bluetooth, SMS, GPS and Wifi. Different from previous work, our work addresses the impacts of human behaviors, i.e., operational behavior and mobile behavior, on virus propagation. Our simulation results will provide further insights into the determining factors of virus propagation in mobile networks. Moreover, we examine two strategies for restraining mobile virus propagation, i.e., pre-immunization and adaptive dissemination strategies drawing on the methodology of autonomy-oriented computing (AOC). The experimental results will show that our strategies can effectively protect large-scale and/or highly dynamic mobile networks.

 

Published In : IJCSN Journal Volume 4, Issue 2

Date of Publication : April 2015

Pages : 392 - 397

Figures : 02

Tables : --

Publication Link : Restriction of Mobile Viruses Using Pre- Immunization and Adaptive Dissemination

 

 

 

Priti Naik : G.H.R.I.E.T.W. Nagpur,Mahharashtra, India

 

 

 

 

 

 

 

Access Control

Authentication

Attribute-Based Signatures

Attribute-Based Encryption

Cloud Storage

In this paper, a two-layer system model for examining the spreading of SMS-based, BT based, GPS and Wifi infections [3] is indicated. Portable handsets gadgets are exploited person to malwares because of their adaptable correspondence and processing capacities, and asset requirements. This is backing in android Smartphone and precisely identifies and erases the infection of the substance before go into the portable working framework. It in the wake of using the applications gives the criticism so that the following client will think about the application. Future work can be improved the infection substance of information's go into the Cell phone through Bluetooth and SMS channels it naturally channel the infection and information independently and erase the infection yet not the information. The result demonstrates that the Smartphone in spreading of infections through distinctive applications is being secured. As Android malware advances henceforth the viability of these sorts of measures will diminish. In any case, these systems are still important as they increase current standards of passage for repackaged and recently dispatched malware.

 

 

 

 

 

 

 

 

 

[1] Chao Gao and Jiming Liu, “Modeling and Restraining Mobile Virus Propagation,” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL.12, NO.3, MARCH 2013. [2] C. Gao, J. Liu, and N. Zhong, “Network Immunization with Distributed Autonomy-Oriented Entities,” IEEE Trans. Parallel and Distributed Systems, vol. 22, no.7, pp. 1222-1229, July 2011. [3] C,Gao and J.Liu, “ Modeling and Predicting the Dynamics of Mobile Virus Spread Affected by Human Behavior”, Proc. IEEE 12th Int’l Symp. A World of Wireless, Mobile and Multimedia Networks (WoWMoM ’11), pp, 1-9, 2011. [4] D. Balcan, V. Colizza, B. Goncalves, H. Hu, J. Ramasco, and A. Vespignani, “Multiscale Mobility Networks and the Spatial Spreading of Infectious Diseases,” Proc. Nat’l Academy of Sciences of USA, vol. 106, no. 51, pp. 21484-21489, 2009. [5] D.-H. Shi, B. Lin, H.-S. Chiang, and M.-H. Shih, “Security Aspects of Mobile Phone Virus: A Critical Survey,” Industrial Management and Data System, vol. 108, no. 4, pp. 478-494, 2008. [6] J.Liu, “Autonomy-Oriented Computing(AOC): The Nature and Implications of a Paradigm for Self- Organized Computing. ”Proc. Fourth Int’l Conf. Natural Computation(ICNC’08),pp.3-11,2008. [7] X. Meng, P. Zerfos, V. Samanta, S.H. Wong, and S. Lu, “Analysis of the Reliability of a Nationwide Short Message Service,” Proc. IEEE INFOCOM, pp. 1811- 1819, 2007. [8] J.Cheng, S.H.Y. Wong,H. Yang, and S.Lu,”Smartsiren Virus Detection and Alert for Smartphones, ”Proc .Fifth Int’l Conf. Mobile Systems, Applications, and Services (MobiSys ’07),pp.258-271,2007. [9] H.Kim, J.Smith, and K.G. Shin, “Detecting Energy- Greedy Anomalies and Mobile Malware Variants,” Proc. Sixth Int’l Conf. Mobile Systems, Applications, and Services (MobiSys 08), PP.239- 252, 2008. [10] L.Xie, H.Song, T. Jaeger, and S.Zhu, “A Systematic Approach for Cell-Phone Worm Containment,” Proc.17th Int’l World Wide Web Conf.(WWW ’08), pp. 1083-1084,2008. [11] Jiming Liu, Xiaolong Jin, Kwok ching Tsui, “ Autonomous Oriented Computing(AOC): Formulating Computational Systems with Autonomous Components.” IEEE Trans on system, man and cybernetics,pp.879-902,nov 2005. [12] Vinit B. Mohata, Dhananjay M. Dakhane, Ravindra L. Pardhi, ” MOBILE MALWARE DETECTION TECHNIQUES”, International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4 No. 04, 2229-3345,Apr 2013. [13] J. Balthrop, S. Forrest, M.E.J. Newman, and M.M. Williamson, “Technological Networks and the Spread of Computer Viruses,” Science, vol. 304, no. 5670, pp. 527-529, 2004. [14] R. Pastor-Satorras and A. Vespignani, “Epidemic Spreading in Scale- Free Networks,” Physical Rev. Letters, vol. 86, no. 14, pp. 3200- 3203, 2001. [15] Adebayo, Olawale Surajudeen, Mabayoje, Amit Mishra, Osho luwafemi, “Malware Detection, Supportive Software Agents and Its Classification schemes”, International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.6, November 2012. [16] B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson. What's Clicking What? Techniques and Innovations of Today's Clickbots. In DIMVA, 2011. [17] N. Daswani and M. Stoppelman. The anatomy of Clickbot. A. In Proceedings of the _rst conference on First Workshop on Hot Topics in Understanding Botnets, pages 11{11. USENIX Association, 2007. [18] N. Daswani, C. Mysen, V. Rao, S. Weis, K. Gharachorloo, and S. Ghosemajumder. Online advertising fraud. Crimeware: Understanding New Attacks and Defenses, 2008. [19] http://en.wikipedia.org/wiki/Mobile_virus