STUDY OF INTRUSIONS IN SMARTPHONE SECURITY PLATEFORM
Abstract
Abstract:- Smart phones and their applications have become important part in our daily life. Availability of mobile cash services like mobile-payment systems and app markets have considerably inflated. Due to which ease of payment and  time utilization increases. As in COVID-19 situation Mobile app develop ment companies running in peak. Recent statistics state that nearly billions of mobile users use various mobile apps during this lockdown. Most of the people downloaded remotely apps and e-learning applications. At the same time we should be alert as  there still are vulnerabilities for Smartphones. These exposures are particularly nasty due to the fact that they permit an intruder to remotely execute code on someone’s phone by sending a specially crafted MMS message.Through which they can also read the messages. Sometimes these messages contain the OTP from the bank, Which can cause the high loss of money. Typically, a cybercriminal will try to trick the user into clicking on a malicious Web link or installing an infected application. This work analyzes the threats to mobile operating systems and types of intrusions, addressing android operating system. Sometime attack signature remains undetected because firewalls and other simple boundary devices lack some degree of intelligence. This deficiency explains why security from intrusion  are becoming more and more important in helping to maintain proper system security. Unlike Laptops, mobile Handhelds are not factory-equipped with firewalls, virus scanners or spam filters. So we must concern with the protection of our Smartphones. For example, antivirus and SMS antispam programs are applied for all popular mobile operating systems. Â
Keywords: Intrusions, Malware, Operating System, Android.
Full Text:
PDFReferences
Abdelmonim Naway, Y. L. (2018). A Review on The Use of Deep Learning in Android Malware Detection. IJRTE , 03.
Abdelmonim Naway, Y. L. (2018). Android Malware Detection Using Autoencoder. International Journal of Computer Engineering and Applications , XII (XII).
Ali Feizollah, N. B.-T. (2017). AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. Elsevier Wordmark .
Amro, B. (2017). MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES. International Journal of Mobile Network Communications & Telematics ( IJMNCT , 7.
Android Security Issues and Solutions. (2018). INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) , 05 (10).
Harvinder Singh, A. B. (2016). A survey on Malware, Botnets and their detection. International Journal of Advanced Engineering Research and Science (IJAERS) , 3 (3).
Johannah Jebaraj, D. J. (2016). An Exploratory Study on Security Issues Pertaining to Smartphone Applications. International Journal In IT and Engineering(IJITE) , 4 (11).
Kapratwar, A. (2017). Static and Dynamic Analysis for Android Malware Detection.
Milad Taleby Ahvanooey*, P. Q. (2017). A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks. (IJACSA) International Journal of Advanced Computer Science and Applications , 8 (10).
Muhammad Waqas Azeem, M. S. (2016). Comparison of Different Techniques for Detecting Malware in Smartphones. International Journal of Computer Science and Information Security (IJCSIS) , 14.
Nirmala Yadav, A. S. (2016). A Survey on Android Malware Detection . International Journal of New Technology and Research (IJNTR) , 47-53.
Persin Kaur Granthi, M. S. (2017). Android Security: A Survey of Security Issues And Defenses. International Research Journal of Engineering and Technology (IRJET) , 04 (07).
Sandeep Sharma, S. D. (2017). Review of Malware Data Classification and Detection in Smart Devices. International Research Journal of Engineering and Technology (IRJET) , 4 (05).
Sardasht M. Mahmood, S. (2016). Mobile Application Security Platforms Survey. International Journal of Computer Applications , 133 (2).
Shanmathi.T, S. S. (2017). MALWARE BYTES – ADVANCED FAULT ANALYSIS. International Research Journal of Engineering and Technology (IRJET) , 04 (03).
Tauseef Ibne Mamun, L. A. (2016). Android Security Vulnerabilities Due to User Unawareness and Frameworks for Overcoming Those Vulnerabilities. International Journal of Computer Applications , 137 (1).
Varsha Saxena, D. S. (2016). Behavior Analysis of Android malware detection for Smart phone. International Journal of Engineering Research & Science (IJOER) , 2 (12).
Varsha Saxena, D. S. (2016). Behavior Analysis of Android malware detection for Smart phone. International Journal of Engineering Research & Science (IJOER) , 02 (12).
Varsha Saxena, D. S. (2016). Behavior Analysis of Android malware detection for Smart phone. International Journal of Engineering Research & Science (IJOER , 02 (12).
Zhenlong Yuan, Y. L. (2016). DroidDetector: Android Malware Characterization and Detection Using Deep Learning. TSINGHUASCIENCEANDTECHNOLOGY , 21.
Refbacks
- There are currently no refbacks.