UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 6
June-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR1907A96


Registration ID:
214534

Page Number

486-490

Share This Article


Jetir RMS

Title

MOBILE MALWARE ATTACKS AND SECURITY ATTRIBUTES

Abstract

The increase of the smart devices is quickly expanding and is progressively turning out to be more modern device in the recent smart world.The smart devices prepared with the advanced complicated software and hardware systems are paying way for the profit of the malware attackers. The malware authors targets the mobile devices and destruct the information in the devices like privacy theft, information theft, denial of service, distributed denial of service and so on. There should be an effective mechanism implemented to overcome these threats and protect the devices from these severe implications malwares. To provide the cost-effective output solution for the smart devices malware detection, the optimization techniques to be improved for the end users control during run- time. Mobile devices such as mobile phones have become one of the most needed and important device for everyone living in the 21st century. This is due to their ability in accommodating people with information and effective communication that make people’s life easier and more meaningful. However, the conveniences offered by the devices come with security concern: mobile malware. There are many incidents caused by mobile malware that downgrade organization’s reputation or financial lost. The mobile malware represent a security threats to mobile devices, there are many types of mobile malware compromising the security platform. Keywords – Mobile, Malware, Hardware, Software, Attack. MOBILE MALWARE ATTACKS AND SECURITY ATTRIBUTES Vinisha Malik , Sandip Kumar Goyal , Naveen Malik Computer science Engineering Department , MM University Mullana, Ambala , India Vinishamalik317@gmail.com , skgmmec@gmail.com , naveenmalik317@gmail.com 1. INTRODUCTION Android Devices have fundamentally changed into an inescapable figuring and stage for limit, with these gadgets; Android gets a handle on an enormous in turn off rate in the share advertise [1]. In 2013 more than 967 million units of cell phones were sold to purchasers around the world, of these PDAs sold to end clients in the last quarter of 2013, essentially 78 percent kept running on the Android position [2] this demonstrate offers of practically 220 million units. The hardware and the software characteristics of the mobile devices are explained. Utilizing the different methods and interfaces used for communication, the malwares utilizes the social building and exploits its range and is discussed in mobile malware and its categories. Mobile devices cannot execute some of the software applications those programs that utilizes large resources as the computer systems do. The malwares infecting these mobile devices will target and destroy the resources through the denial-of service attack. The most difficult and challenging limitation for the defense and detection of data is the resource constraints. Attackers utilizes the trustful channels for the process of authorization using the network services such as messages, calls, payment modes to create loss for the end user of the devices. Various security characteristics related to mobile devices are discussed in this article.

Key Words

software engineering; reengineering.

Cite This Article

"MOBILE MALWARE ATTACKS AND SECURITY ATTRIBUTES", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 6, page no.486-490, June 2019, Available :http://www.jetir.org/papers/JETIR1907A96.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"MOBILE MALWARE ATTACKS AND SECURITY ATTRIBUTES", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 6, page no. pp486-490, June 2019, Available at : http://www.jetir.org/papers/JETIR1907A96.pdf

Publication Details

Published Paper ID: JETIR1907A96
Registration ID: 214534
Published In: Volume 6 | Issue 6 | Year June-2019
DOI (Digital Object Identifier):
Page No: 486-490
Country: -, -, - .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002802

Print This Page

Current Call For Paper

Jetir RMS