Title
MOBILE MALWARE ATTACKS AND SECURITY ATTRIBUTES
Abstract
The increase of the smart devices is quickly expanding and is progressively turning out to be more modern
device in the recent smart world.The smart devices prepared with the advanced complicated software and hardware
systems are paying way for the profit of the malware attackers. The malware authors targets the mobile devices and
destruct the information in the devices like privacy theft, information theft, denial of service, distributed denial of
service and so on. There should be an effective mechanism implemented to overcome these threats and protect the
devices from these severe implications malwares. To provide the cost-effective output solution for the smart devices
malware detection, the optimization techniques to be improved for the end users control during run- time. Mobile
devices such as mobile phones have become one of the most needed and important device for everyone living in the 21st
century. This is due to their ability in accommodating people with information and effective communication that make
people’s life easier and more meaningful. However, the conveniences offered by the devices come with security
concern: mobile malware. There are many incidents caused by mobile malware that downgrade organization’s
reputation or financial lost. The mobile malware represent a security threats to mobile devices, there are many types of
mobile malware compromising the security platform.
Keywords – Mobile, Malware, Hardware, Software, Attack.
MOBILE MALWARE ATTACKS
AND SECURITY ATTRIBUTES
Vinisha Malik , Sandip Kumar Goyal , Naveen Malik
Computer science Engineering Department , MM University Mullana, Ambala , India
Vinishamalik317@gmail.com , skgmmec@gmail.com , naveenmalik317@gmail.com
1. INTRODUCTION
Android Devices have fundamentally changed into an inescapable figuring and stage for limit, with these gadgets;
Android gets a handle on an enormous in turn off rate in the share advertise [1]. In 2013 more than 967 million units of
cell phones were sold to purchasers around the world, of these PDAs sold to end clients in the last quarter of 2013,
essentially 78 percent kept running on the Android position [2] this demonstrate offers of practically 220 million
units. The hardware and the software characteristics of the mobile devices are explained. Utilizing the different
methods and interfaces used for communication, the malwares utilizes the social building and exploits its range and is
discussed in mobile malware and its categories. Mobile devices cannot execute some of the software applications those
programs that utilizes large resources as the computer systems do. The malwares infecting these mobile devices will
target and destroy the resources through the denial-of service attack. The most difficult and challenging limitation for
the defense and detection of data is the resource constraints. Attackers utilizes the trustful channels for the process of
authorization using the network services such as messages, calls, payment modes to create loss for the end user of the
devices. Various security characteristics related to mobile devices are discussed in this article.
Key Words
software engineering; reengineering.
Cite This Article
"MOBILE MALWARE ATTACKS AND SECURITY ATTRIBUTES", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 6, page no.486-490, June 2019, Available :
http://www.jetir.org/papers/JETIR1907A96.pdf
ISSN
2349-5162 | Impact Factor 7.95 Calculate by Google Scholar
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Cite This Article
"MOBILE MALWARE ATTACKS AND SECURITY ATTRIBUTES", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 6, page no. pp486-490, June 2019, Available at : http://www.jetir.org/papers/JETIR1907A96.pdf
Publication Details
Published Paper ID: JETIR1907A96
Registration ID: 214534
Published In: Volume 6 | Issue 6 | Year June-2019
DOI (Digital Object Identifier):
Page No: 486-490
Country: -, -, - .
Area: Engineering
ISSN Number: 2349-5162
Download Paper / Preview Article
Preview This Article
Downlaod
Click here for Article Preview