Académique Documents
Professionnel Documents
Culture Documents
RESEARCH ARTICLE
OPEN ACCESS
ABSTRACT
Android based Smartphone are now a days getting more popularity. W ith the use of Smartphone user must always
concern about the security breaching and malicious attacks. Here we introduce an approach for proactive malware
detection working by abstraction of program behaviors. Suspicious behaviors are detected by comparing t race
abstractions to reference malicious behaviors. The sen sitive power of concept allo ws us to grip co mmon
mistrustful behaviors rather than specific malware code and then, to distinguish malware transformat ion. We
present and discuss an imp lementation validating our approach. First have to analyze the programs or apps, then
represented them as trace languages, which are abstracted by altering with respect to elementary behavior
patterns, defined as regular string rephrasing systems. This paper rev iew the state of the art on threat s, vulnerabilities ,
We aimed at existing approaches to protecting mobile devices against these classes of attacks into different
categories, based upon the detection principles, arch itectures, collected data and operating systems, esp ecially
focusing on IDS-based models and tools.
Keywords : Android, Wi-Fi, Smart phone device, JSON parser, etc.
I.
INTRODUCTION
ISSN: 2347-8578
www.ijcstjournal.org
Page 110
International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 2 , Mar - Apr 2016
2.
3.
4.
5.
6.
7.
ISSN: 2347-8578
supplemental hard
drives, CDs/DVDs,
or flash
drives to store critical, hard-to-replace data.
Report problems: If you believe that your co mputer
or any data on it has been co mpro mised, your should
make a informat ion security incident report. That is
required by Un iversity policy for all data on our
systems, and legally required for health, education,
financial and any other kind of record containing
identifiable personal information.
8.
III.
OVERVIEW
www.ijcstjournal.org
Page 111
International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 2 , Mar - Apr 2016
can be easy for the user to identify the malware.
For examp le a gaming applicat ion requires SMS
permission, but there is no need for SMS in that
application. So the application can send premiu m
rated SMS to any number in background.
2)
4) M ALWARE DETECTION:
There are many malwares are floating in the web
that can be affecting the android OS, so we
maintaining a huge collection of malware
database to easily find the identified malwares. If
the user scan the entire application installed in
their mob ile each application will be co mpared to
our malware database if any app found malware,
our system shows error and instruct the user to
uninstall the particular application.
User no needs to scan for every time for
malware when installed any application, our
system automatically scan the newly installed
application for malware whenever user install any
new application. If the application is found
malware It show the error.
EXTRACT INFORMATION:
Android security model h ighly relies on
permission-based. There are about 130
permissions that govern access to different
resources. Whenever the user installs a new app,
he would be pro mpt to approve or reject all
permissions requested by the application. In this
module if user selects any running application its
Manifest permissions are shown to the user. It
ISSN: 2347-8578
www.ijcstjournal.org
Page 112
International Journal of Computer Science Trends and Technology (IJCST) Volume 4 Issue 2 , Mar - Apr 2016
IV.
CONCLUSIONS
Malwares",
Retrieved
Http://Www.Malwareinfo.Org/ Library/Whitepa
pers/Malwareanalysishow2.Pdf,Last Accessed:
24 August, 2011.
[5]
[6]
[7]
[8]
[9]
Johannes
Kinder,
Stefan
Katzenbeisser,
Christian Schallhart, And Helmut Veith.
Proactive Detection Of Co mputer Worms Using
Model Checking. IEEE Transactions On
Dependable And Secure Co mputing, 7:424{438,
October 2010.
[10]
FUTURE ENHANCEMANT
Future enhancement is to buy a server for
automatic updating of behaviours changes.
REFERENCES
[1]
[2]
[3]
[4]
ISSN: 2347-8578
www.ijcstjournal.org
Page 113