Research in Progress – Defending Android Smartphones from Malware Attacks
Research in Progress- Defending Android Smartphones from Malware Attacks
ABSTRACT:
Smartphones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smartphone is one of the most widely used platforms by businesses and users alike. This is partially because Android smartphones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smartphones and the sensitive information they contain; the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smartphones. The survey also intended to study the scope of malware attacks targeting Android phones and the effectiveness of existing defense measures. The study surveyed the average Android users as the target population to understand how they perceive security and what security controls they use to protect their smartphones.
EXISTING SYSTEM:
A focused review of the literature reveals that there have been many protection strategies offered for securing smartphones and ensuring user privacy; however, most of those endeavors are small-scale and tackle particular areas of protection, such as access control and anomaly detection.
DISADVANTAGES OF EXISTING SYSTEM:
Malware attacks on smartphones were generally “proof of concept” attempts to break to the phone’s system and cause damage. However, the new generation of smartphone malware attacks has increased in sophistication and is designed to cause severe financial losses (caused by identity theft) and disruption of critical software applications.
Most of those endeavors are small-scale and tackle particular areas of protection, such as access control and anomaly detection.
PROPOSED SYSTEM:
The primary goal of this research study is to investigate security risks associated with the use of Android smartphones and then propose to design an effective, realtime, integrated defense framework for Android smartphones. This study will contribute to identifying top security threats facing Android phones and the confidential information they contain.
ADVANTAGES OF PROPOSED SYSTEM:
The proposed solution will detect attacks (viruses, worms, and Trojan horses) and prompt users to take actions to prevent breaches; any suspicious activity that may reveal personal information to third parties or unknown entities will be reported to users to prevent potential attacks.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
Ø System : Pentium IV 2.4 GHz.
Ø Hard Disk : 40 GB.
Ø Floppy Drive : 1.44 Mb.
Ø Monitor : 15 VGA Colour.
Ø Mouse : Logitech.
Ø Ram : 512 Mb.
Ø MOBILE : ANDROID
SOFTWARE REQUIREMENTS:
Ø Operating system : Windows XP.
Ø Coding Language : Java 1.7
Ø Tool Kit : Android 2.3
Ø IDE : Eclipse
REFERENCE:
Dr.Marwan Omar, Dr.Maurice Dawson, “Research in Progress- Defending Android Smartphones from Malware Attacks”, IEEE 2013 Third International Conference on Advanced Computing & Communication Technologies.
Comments are closed.