Académique Documents
Professionnel Documents
Culture Documents
CONTENT REVIEW
Introduction
Existing system
Proposed system
Modules
System configuration
Conclusion
Future enhancement
INTRODUCTION
Today ,More than 200,000 Android and 300,000 iPhone applications
are available and increasing rapidly.
Mobile services changes to cloud-based mobile services with richer
communications and higher flexibility
New mobile cloud infrastructure that combines mobile devices and
cloud services.
The data stored in cloud infrastructure can be accessed at any time and
from anywhere through mobile devices
EXISTING SYSTEM
On normal mobile devices, vaccine applications detect malware through
signature-based method.
These methods can detect malware efficiently, but they cannot detect new
malware whose signature is unknown.
In mobile cloud infrastructure, malware will spread entire infrastructure.
PROPOSED SYSTEM
Focus on abnormal behavior detection on mobile cloud infrastructure.
Signature based methods fails to detect malware on virtual mobile instance in
future.
Behavior-based abnormal detection can address those problems by observing
activities in the cloud infrastructure.
Using monitored data, abnormal behavior is detected by machine learning
algorithm.
To validate our methodology, we built a test bed for mobile cloud infrastructure .
MODULES
USER MODULE:
Users are having authentication and security to access the detail which is
presented in the system.
Before accessing or searching the details user should have the account in
that otherwise they should register first.
MALWARE DATA
We chose Gold Miner malware applications to obtain abnormal data in our
mobile cloud infrastructure.
It gathers location and device identifiers (IMEI and IMSI), and sends the
information to its server.
The malware target is affecting each mobile instance as zombie.
And there are many other malware have the same purpose but their functionality
and behavior are different from each other.
System Configuration
H/W System Configuration
Processor
Pentium III
Speed
1.1 Ghz
RAM
256 MB(min)
Hard Disk
- 20 GB
Floppy Drive
1.44 MB
Key Board
Mouse
Monitor
SVGA
: Windows95/98/2000/XP
Application Server
: Tomcat5.0/6.X
Front End
Scripts
: JavaScript
Database
: Mysql 5.0
Database Connectivity
: JDBC.
Conclusion
We presented new mobile cloud service to discuss some possible scenario for
individual users and office worker
To address security issue in mobile cloud infrastructure , we proposed abnormal
behavior monitoring methodology and architecture to detect malware
Testing can be done by using by test beds
RF machine learning algorithm shows that our proposed methodology and
architecture successfully detected abnormal behavior
Future Enhancement
For future work, we investigate service feasability of this new mobile cloud service
Monitoring of mobile cloud infrastructure focus on security issues, other monitoring
metrics focus on configuration of services and charging of users
We will also measure the performance of our proposed monitoring architecture.
For security aspects ,we will gather additional types of sample malware in order to
improve the accuracy of various machine learning algorithm.
We will consider other monitoring features to improve the accuracy of detecting
abnormal behavior
THANK YOU