Viruses and malwares can spread can spread from
PC systems into versatile systems with the fast development of
shrewd mobile phone clients. In a portable system, infections
and malwares can result in protection information spillage,
additional charges, and remote tuning in. Moreover, they can
stick remote servers by sending a huge number of spam
messages or track client positions through GPS. On account of
the potential harms of portable infections, it is critical for us to
pick up a profound understanding of the spread instruments of
versatile infections. We propose a network model for
simulating virus propagation through both Bluetooth, SMS,
GPS and Wifi. Different from previous work, our work
addresses the impacts of human behaviors, i.e., operational
behavior and mobile behavior, on virus propagation. Our
simulation results will provide further insights into the
determining factors of virus propagation in mobile networks.
Moreover, we examine two strategies for restraining mobile
virus propagation, i.e., pre-immunization and adaptive
dissemination strategies drawing on the methodology of
autonomy-oriented computing (AOC). The experimental
results will show that our strategies can effectively protect
large-scale and/or highly dynamic mobile networks.
Priti Naik : G.H.R.I.E.T.W. Nagpur,Mahharashtra, India
Access Control
Authentication
Attribute-Based
Signatures
Attribute-Based Encryption
Cloud Storage
In this paper, a two-layer system model for examining
the spreading of SMS-based, BT based, GPS and Wifi
infections [3] is indicated. Portable handsets gadgets are
exploited person to malwares because of their adaptable correspondence and processing capacities, and asset
requirements. This is backing in android Smartphone
and precisely identifies and erases the infection of the
substance before go into the portable working
framework. It in the wake of using the applications gives
the criticism so that the following client will think about
the application. Future work can be improved the
infection substance of information's go into the Cell phone through Bluetooth and SMS channels it
naturally channel the infection and information
independently and erase the infection yet not the
information. The result demonstrates that the
Smartphone in spreading of infections through
distinctive applications is being secured. As Android
malware advances henceforth the viability of these sorts
of measures will diminish. In any case, these systems are
still important as they increase current standards of
passage for repackaged and recently dispatched
malware.
[1] Chao Gao and Jiming Liu, “Modeling and Restraining
Mobile Virus Propagation,” IEEE TRANSACTIONS
ON MOBILE COMPUTING, VOL.12, NO.3,
MARCH 2013.
[2] C. Gao, J. Liu, and N. Zhong, “Network Immunization
with Distributed Autonomy-Oriented Entities,” IEEE
Trans. Parallel and Distributed Systems, vol. 22, no.7,
pp. 1222-1229, July 2011.
[3] C,Gao and J.Liu, “ Modeling and Predicting the
Dynamics of Mobile Virus Spread Affected by Human
Behavior”, Proc. IEEE 12th Int’l Symp. A World of
Wireless, Mobile and Multimedia Networks
(WoWMoM ’11), pp, 1-9, 2011.
[4] D. Balcan, V. Colizza, B. Goncalves, H. Hu, J.
Ramasco, and A. Vespignani, “Multiscale Mobility
Networks and the Spatial Spreading of Infectious
Diseases,” Proc. Nat’l Academy of Sciences of USA,
vol. 106, no. 51, pp. 21484-21489, 2009.
[5] D.-H. Shi, B. Lin, H.-S. Chiang, and M.-H. Shih,
“Security Aspects of Mobile Phone Virus: A Critical
Survey,” Industrial Management and Data System, vol.
108, no. 4, pp. 478-494, 2008.
[6] J.Liu, “Autonomy-Oriented Computing(AOC): The
Nature and Implications of a Paradigm for Self-
Organized Computing. ”Proc. Fourth Int’l Conf.
Natural Computation(ICNC’08),pp.3-11,2008.
[7] X. Meng, P. Zerfos, V. Samanta, S.H. Wong, and S.
Lu, “Analysis of the Reliability of a Nationwide Short
Message Service,” Proc. IEEE INFOCOM, pp. 1811-
1819, 2007.
[8] J.Cheng, S.H.Y. Wong,H. Yang, and S.Lu,”Smartsiren
Virus Detection and Alert for Smartphones, ”Proc .Fifth Int’l Conf. Mobile Systems, Applications, and
Services (MobiSys ’07),pp.258-271,2007.
[9] H.Kim, J.Smith, and K.G. Shin, “Detecting Energy-
Greedy Anomalies and Mobile Malware Variants,”
Proc. Sixth Int’l Conf. Mobile Systems, Applications,
and Services (MobiSys 08), PP.239- 252, 2008.
[10] L.Xie, H.Song, T. Jaeger, and S.Zhu, “A Systematic
Approach for Cell-Phone Worm Containment,”
Proc.17th Int’l World Wide Web Conf.(WWW ’08),
pp. 1083-1084,2008.
[11] Jiming Liu, Xiaolong Jin, Kwok ching Tsui, “
Autonomous Oriented Computing(AOC): Formulating
Computational Systems with Autonomous
Components.” IEEE Trans on system, man and
cybernetics,pp.879-902,nov 2005.
[12] Vinit B. Mohata, Dhananjay M. Dakhane, Ravindra L.
Pardhi, ” MOBILE MALWARE DETECTION
TECHNIQUES”, International Journal of Computer
Science & Engineering Technology (IJCSET), Vol. 4
No. 04, 2229-3345,Apr 2013.
[13] J. Balthrop, S. Forrest, M.E.J. Newman, and M.M.
Williamson, “Technological Networks and the Spread
of Computer Viruses,” Science, vol. 304, no. 5670, pp.
527-529, 2004.
[14] R. Pastor-Satorras and A. Vespignani, “Epidemic
Spreading in Scale- Free Networks,” Physical Rev.
Letters, vol. 86, no. 14, pp. 3200- 3203, 2001.
[15] Adebayo, Olawale Surajudeen, Mabayoje, Amit
Mishra, Osho luwafemi, “Malware Detection,
Supportive Software Agents and Its Classification
schemes”, International Journal of Network Security &
Its Applications (IJNSA), Vol.4, No.6, November
2012.
[16] B. Miller, P. Pearce, C. Grier, C. Kreibich, and V.
Paxson. What's Clicking What? Techniques and
Innovations of Today's Clickbots. In DIMVA, 2011.
[17] N. Daswani and M. Stoppelman. The anatomy of
Clickbot. A. In Proceedings of the _rst conference on
First Workshop on Hot Topics in Understanding
Botnets, pages 11{11. USENIX Association, 2007.
[18] N. Daswani, C. Mysen, V. Rao, S. Weis, K.
Gharachorloo, and S. Ghosemajumder. Online
advertising fraud. Crimeware: Understanding New
Attacks and Defenses, 2008.
[19] http://en.wikipedia.org/wiki/Mobile_virus