Research in Progress- Defending Android Smartphones from Malware Attacks

ABSTRACT:

Smartphones are becoming enriched withconfidential information due to their powerful computationalcapabilities and attractive communications features. TheAndroid smartphone is one of the most widely used platformsby businesses and users alike. This is partially becauseAndroid smartphones use the free, open-source Linux as theunderlying operating system, which allows development ofapplications by any software developer. This research studyaims to explore security risks associated with the use ofAndroid smartphones and the sensitive information theycontain; the researcher devised a survey questionnaire toinvestigate and further understand security threats targetingAndroid smartphones. The survey also intended to study thescope of malware attacks targeting Android phones and theeffectiveness of existing defense measures. The study surveyedthe average Android users as the target population tounderstand how they perceive security and what securitycontrols they use to protect their smartphones.

EXISTING SYSTEM:

A focusedreview of the literature reveals that there have been manyprotection strategies offered for securing smartphones andensuring user privacy; however, most of those endeavors aresmall-scale and tackle particular areas of protection, such asaccess control and anomaly detection.

DISADVANTAGES OF EXISTING SYSTEM:

Malware attacks on smartphones weregenerally “proof of concept” attempts to break to the phone’ssystem and cause damage. However, the new generation ofsmartphone malware attacks has increased in sophisticationand is designed to cause severe financial losses (caused byidentity theft) and disruption of critical software applications.

Most of those endeavors aresmall-scale and tackle particular areas of protection, such asaccess control and anomaly detection.

PROPOSED SYSTEM:

The primary goal of this research study is toinvestigate security risks associated with the use of Androidsmartphones and then propose to design an effective, realtime,integrated defense framework for Androidsmartphones. This study will contribute to identifying topsecurity threats facing Android phones and the confidentialinformation they contain.

ADVANTAGES OF PROPOSED SYSTEM:

The proposed solution will detectattacks (viruses, worms, and Trojan horses) and promptusers to take actions to prevent breaches; any suspiciousactivity that may reveal personal information to third partiesor unknown entities will be reported to users to preventpotential attacks.

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

System: Pentium IV 2.4 GHz.

Hard Disk : 40 GB.

Floppy Drive: 1.44 Mb.

Monitor: 15 VGA Colour.

Mouse: Logitech.

Ram: 512 Mb.

MOBILE:ANDROID

SOFTWARE REQUIREMENTS:

Operating system : Windows XP.

Coding Language: Java 1.7

Tool Kit:Android 2.3

IDE:Eclipse

REFERENCE:

Dr.Marwan Omar, Dr.Maurice Dawson, “Research in Progress- Defending Android Smartphones from Malware Attacks”, IEEE 2013 Third International Conference on Advanced Computing & Communication Technologies.