SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2727
ROOT SECURITY FIREWALL
G. Mathan1, M.S Mohamed Rasith2, R. Praveen Kumar3, S. Sathish Kumar4
1,2,3UG Student, Dept of CSE, SNS College of Technology, Coimbatore.
4 Associate Professor, Dept of CSE, SNS College of Technology, Coimbatore.
-------------------------------------------------------------------------***------------------------------------------------------------------------
ABSTRACT- In Mobile environment, Android-Security is becoming a notable feature of today's Android Phones and tablets
where users can download unknown apps, spyware’s and connect their Android device to unknown networks when its
roaming and using public networks without knowing the risk. This project proposes and entrust an enhanced monitored
security model and architecture for Android platform. In recent years, the amount of malicious(spyware) mobile application
and malware targeting android based smartphones and portable devices has increase rapidly and security decreased
respectively. Thus, the security for the android mobile is most needed. Root Security Firewall (RS Firewall) can grand or
revoke the network permissions and monitor other applications and show the front-end that application access the android
network permission. This RS firewall can monitor other application activity mainly their android permission access (network)
and display them to user with check box. RS Firewall have the list of applications that’s installed in the Android Mobile. RS
Firewall have the network permission access and it can grant or revoke network permission to other applications. Thus, RS
Firewall made the Android device network transparent as the checklist to the user then the user can grant or revoke the
network permission to all applications in android by this approach Android can access the network in control manner. Here
we improve the Security of the Android device by network monitor firewall.
Key Words: Firewall, Android Security, Cyber security, Privacy and Android Application.
1. INTRODUCTION
The RS Firewall app is an Android Firewall Application but had some extra secure functionality for Networks.
Before presenting more features concerning RS Firewall, we will prevent some of anti-malware and spyware strategies,
which we believe are important to ensure security in our Application. Note that these strategies are general strategies,
which are used on various clients like Microsoft, Linux, and Mac OS. Some of the anti-malware and anti-spyware Process
require the user interaction to decide what to do with malicious applications either which are not clearly safe or not
clearly malware. Nowadays, anyone can develop Android applications with Android application development tools and
without having strong programming skills. So, the market price of developing Android applications is very low. Most of the
companies and developers do not have proper security skills, to create a proper secured Android application.
Therefore, the developers sometimes do not consider all security issues and that’s leads to insecure, they are
simply not skilled enough to be aware of all vulnerabilities and risks. However, the user is often not in the best position to
decide. We therefore propose that the user choose a security policy. There could be two different security policies, which
the user could use One anti-malware strategy is to grant permission to all Unknown applications. Another anti-malware
strategy is to deny permission to all Unknown applications.
The problem with all these strategies is that all are far too general. Our solution's main component is as
mentioned, an Extreme Network controlled Environment for Android Mobile. The network is most important in Android
smart devices and it is the key for the data theft the malicious applications use the network to be spying the device and
transfer the data through network and some hacking also done by network like honeypot. The second component is, also
as mentioned, the RS Firewall Application use the afwall+ Server maintaining a iptables to provide secure network access
to the applications, including their status and other statistics. A simplified version of the RS Firewall Application. By the
Access of Super User, we can grand or revoke permissions to the installed applications. The android has the permission
control feature by that we can grand the permission for that mode of safe network or revoke the permission for the mode
of unknown network.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2728
Fig -1: Permissions Request flow
2. LITERATURE SURVEY
1) P. D. Meshram, Department of Information Technology, “SGGSIE&T Nanded” and Dr. R.C. Thool, Department of
Information Technology, “SGGSIE&T Nanded” in Conference December 2014, DOI: 10.1109/GCWCN.2014.7030873. [1]
The amount of malicious mobile application targeting Android based smartphones has increase rapidly. In
addition, these malicious apps can download modules from servers which are run by malicious users, meaning that
unexpected events can be activated inside of smartphones [3]. Therefore, the attacker can control and get personal
information and data stored inside of smartphone illegally. Smartphones are not just phones but also portable
computers, providing diverse services needed in life including calls, texts, emails, GPS, camera, Wi-Fi and Bluetooth apps.
These apps keep and manage diverse intrinsic data as well as sensitive private information such as address books.
Smartphones enable swift and easy data exchange via 3G, 4G and Wi-Fi. Thus, personal information stored on
Smartphones is prone to leakage.
2) Caner Kilinc, Todd Booth, and Karl Andersson Pervasive and Mobile Computing Laboratory, “Luleå University of
Technology” in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and
Communications. [9]
● WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS.
● Cloud keeping track of millions of applications and their reputation (good, bad, or unknown) and comparing traffic
flows of applications with a list of known malicious IP servers.
3. PROPOSED SYSTEM
Most of the people are using smart phone. So, Security for the Smart Phone is need most. Thus, we Proposed the
system “ROOT SECURITY FIREWALL” (RS Firewall). Which can monitor other application activity mainly their android
Network permission access and display them to user in the Application UI as simple check box. The user could decide the
application is malware or not. The internet is main thing in hacking, so RS Firewall can grant and revoke network access to
all applications in Rooted Android Platform. RS Firewall have the list of applications that’s installed in the Android Mobile.
RS Firewall have the network permission access and it can grant or revoke network permission to other applications.
Thus, RS Firewall made the Android device network transparent as check list to the user then the user can grant or revoke
the network permission to all applications in android by this approach Android can access the network in control manner.
Here we improve the Security of the Android device by network monitor firewall.
RS Firewall have both white list approach and the blacklist approach by this it’s become handy in many situations.
If we need only few application in the network we connected means we can use white list approach that only allow
selected application to access the network else we need to block only some application means can use blacklist approach
that restrict selected application from access the network and their network permission access and it can grand or revoke
network permission to that selected applications. RS Firewall have the button on/off which is used to access the
permission. RS Firewall can show the application access history(log) on Android Security permissions. By knowing the
application Permission history user can block harmful permissions.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2729
Fig -2: Proposed Application
4. MODULE DESCRIPTION
4.1 Network Module:
● List of Application
RS Firewall have the list of applications that’s installed in the Android Mobile.
Fig - 3: List of applications and options
● Network Permission
RS Firewall have the network permission access and it can grant or revoke network permission to other applications.
● Button
RS Firewall have the button on/off which is used to access the permission.
4.2 Permission Module:
● List of Application
RS Firewall have the list of application which in order of the installed time or its permissions based
● Network Types
RS Firewall can show the application network access type on Android Security permissions like wifi, mobile data, lan. etc..
● Block Permissions
By knowing the application Permission history user can block harmful network access permissions.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2730
Fig - 4: Symbols used
5. CONCLUSION
In this modern era, people have been using Smart devices particularly Android devices. There is no security in Android
compare to the apple platform. who do not have a knowledge about androids their devices can easily hacked. The
important factor of hacking is transmission medium, here it is networks. Hence RS Firewall ensures the security of the
android platform that they control all other application networks Permissions by the Authority of Super User. It has simple
user interface like checkbox So it is User Friendly.
REFERENCE
1. A survey paper on vulnerabilities in Android OS and Security of Android Devices at:
https://www.researchgate.net/publication/280096665
2. Afwall+ - https://apkpure.com/afwall-android-firewall/dev.ukanth.ufirewall.
3. Android API Guide - Permission, http://developer.android.com guide/topics/manifest/permissionelement.html.
4. Android Permission, https://android.googlesource.com/platform /frameworks
/base/+/master/core/res/AndroidManifest.xml
5. Android Proguard, http://developer.android.com/tools/help/ proguard.html.
6. ContentProvider, http://developer.android.com/intl/ko/reference/android /content/ContentProvider.html.
7. Dalvik, http://ko.wikipedia.org/wiki/%EB%8B%AC%EB%B9%85_
(%EC%86%8C%ED%94%84%ED%8A%B8%EC%9B%A8%EC %96%B4.
8. Smali, http://code.google.com/p/smali/.
9. WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS -2012 IEEE 11th
International Conference on Trust, Security and Privacy in Computing and Communications.

More Related Content

PDF
Comilion introduction presentation 26102012 (1)
PDF
Android Based Smart Department
PDF
Samsung knox security_solution_v1_10_0
PDF
Survey on Security Issues of Internet of Things (IoT) Devices
PDF
ForeScout IoT Enterprise Risk Report
PDF
Google Android Security 2014 Report
PDF
Secure your Future with IoT Security Testing | Application Security
PDF
Bolstering the security of iiot applications – how to go about it
Comilion introduction presentation 26102012 (1)
Android Based Smart Department
Samsung knox security_solution_v1_10_0
Survey on Security Issues of Internet of Things (IoT) Devices
ForeScout IoT Enterprise Risk Report
Google Android Security 2014 Report
Secure your Future with IoT Security Testing | Application Security
Bolstering the security of iiot applications – how to go about it

What's hot (20)

PDF
IRJET- Phishing Attack based on Visual Cryptography
PDF
IRJET - System to Identify and Define Security Threats to the users About The...
PDF
INSECURE Magazine - 37
PDF
How Secure Is Your Building Automation System?
PDF
IRJET- Sniffer for Tracking Lost Mobile
PPTX
SC Magazine & ForeScout Survey Results
PDF
Veracode State of Software Security vol 4
PDF
Securing SCADA
PDF
Trojan horseofbyod2
PDF
Turning the Tables on Cyber Attacks
PDF
Solution: Block Armour Secure Remote Access for WFH
PDF
Security Issues and Challenges in Internet of Things – A Review
PPTX
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
PDF
Techvorm com-android-security-issues-solutions
PDF
BETTER- Threat Whitepaper- PoS
PDF
Importance of Electronic Surveillance in Criminal Investigation
PPTX
How Healthcare CISOs Can Secure Mobile Devices
PDF
2012 nq mobile_security_report
PDF
Samsung knox uk eud_whitepaper_3
PDF
Samsung knox and android for work
IRJET- Phishing Attack based on Visual Cryptography
IRJET - System to Identify and Define Security Threats to the users About The...
INSECURE Magazine - 37
How Secure Is Your Building Automation System?
IRJET- Sniffer for Tracking Lost Mobile
SC Magazine & ForeScout Survey Results
Veracode State of Software Security vol 4
Securing SCADA
Trojan horseofbyod2
Turning the Tables on Cyber Attacks
Solution: Block Armour Secure Remote Access for WFH
Security Issues and Challenges in Internet of Things – A Review
Internet of Things - Desire for Convenience Brings Multiple New Attack Vectors
Techvorm com-android-security-issues-solutions
BETTER- Threat Whitepaper- PoS
Importance of Electronic Surveillance in Criminal Investigation
How Healthcare CISOs Can Secure Mobile Devices
2012 nq mobile_security_report
Samsung knox uk eud_whitepaper_3
Samsung knox and android for work
Ad

Similar to IRJET- Root Security Firewall (20)

PDF
Android Security: A Survey of Security Issues and Defenses
PDF
Forensic Tool for Android Mobile Device
PDF
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
PDF
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
PDF
Implementing security on android application
PDF
Application Security framework for Mobile App Development in Enterprise Setup
PDF
A Study on Modern Methods for Detecting Mobile Malware
PDF
IRJET- Android Device Attacks and Threats
PDF
Attribute-based Permission Model for Android Smartphones
PDF
IRJET- Cross Platform Penetration Testing Suite
PDF
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
PDF
A017360104
PDF
Comparative Study on Intrusion Detection Systems for Smartphones
PDF
IRJET- Survey on Security Threats and Remedies in Cloud Computing
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
I018145157
PDF
IRJET- Android Malware Detection System
PPTX
Mobile App Security: Enterprise Checklist
PDF
IRJET - Cyber Security Threats and Measures in Context with IoT
Android Security: A Survey of Security Issues and Defenses
Forensic Tool for Android Mobile Device
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
Implementing security on android application
Application Security framework for Mobile App Development in Enterprise Setup
A Study on Modern Methods for Detecting Mobile Malware
IRJET- Android Device Attacks and Threats
Attribute-based Permission Model for Android Smartphones
IRJET- Cross Platform Penetration Testing Suite
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
A017360104
Comparative Study on Intrusion Detection Systems for Smartphones
IRJET- Survey on Security Threats and Remedies in Cloud Computing
Mobile App Security Testing_ A Comprehensive Guide.pdf
I018145157
IRJET- Android Malware Detection System
Mobile App Security: Enterprise Checklist
IRJET - Cyber Security Threats and Measures in Context with IoT
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PPTX
Welding lecture in detail for understanding
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
Well-logging-methods_new................
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Geodesy 1.pptx...............................................
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
DOCX
573137875-Attendance-Management-System-original
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Welding lecture in detail for understanding
Operating System & Kernel Study Guide-1 - converted.pdf
Well-logging-methods_new................
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Geodesy 1.pptx...............................................
UNIT 4 Total Quality Management .pptx
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Lesson 3_Tessellation.pptx finite Mathematics
CH1 Production IntroductoryConcepts.pptx
Construction Project Organization Group 2.pptx
bas. eng. economics group 4 presentation 1.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
573137875-Attendance-Management-System-original
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Arduino robotics embedded978-1-4302-3184-4.pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx

IRJET- Root Security Firewall

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2727 ROOT SECURITY FIREWALL G. Mathan1, M.S Mohamed Rasith2, R. Praveen Kumar3, S. Sathish Kumar4 1,2,3UG Student, Dept of CSE, SNS College of Technology, Coimbatore. 4 Associate Professor, Dept of CSE, SNS College of Technology, Coimbatore. -------------------------------------------------------------------------***------------------------------------------------------------------------ ABSTRACT- In Mobile environment, Android-Security is becoming a notable feature of today's Android Phones and tablets where users can download unknown apps, spyware’s and connect their Android device to unknown networks when its roaming and using public networks without knowing the risk. This project proposes and entrust an enhanced monitored security model and architecture for Android platform. In recent years, the amount of malicious(spyware) mobile application and malware targeting android based smartphones and portable devices has increase rapidly and security decreased respectively. Thus, the security for the android mobile is most needed. Root Security Firewall (RS Firewall) can grand or revoke the network permissions and monitor other applications and show the front-end that application access the android network permission. This RS firewall can monitor other application activity mainly their android permission access (network) and display them to user with check box. RS Firewall have the list of applications that’s installed in the Android Mobile. RS Firewall have the network permission access and it can grant or revoke network permission to other applications. Thus, RS Firewall made the Android device network transparent as the checklist to the user then the user can grant or revoke the network permission to all applications in android by this approach Android can access the network in control manner. Here we improve the Security of the Android device by network monitor firewall. Key Words: Firewall, Android Security, Cyber security, Privacy and Android Application. 1. INTRODUCTION The RS Firewall app is an Android Firewall Application but had some extra secure functionality for Networks. Before presenting more features concerning RS Firewall, we will prevent some of anti-malware and spyware strategies, which we believe are important to ensure security in our Application. Note that these strategies are general strategies, which are used on various clients like Microsoft, Linux, and Mac OS. Some of the anti-malware and anti-spyware Process require the user interaction to decide what to do with malicious applications either which are not clearly safe or not clearly malware. Nowadays, anyone can develop Android applications with Android application development tools and without having strong programming skills. So, the market price of developing Android applications is very low. Most of the companies and developers do not have proper security skills, to create a proper secured Android application. Therefore, the developers sometimes do not consider all security issues and that’s leads to insecure, they are simply not skilled enough to be aware of all vulnerabilities and risks. However, the user is often not in the best position to decide. We therefore propose that the user choose a security policy. There could be two different security policies, which the user could use One anti-malware strategy is to grant permission to all Unknown applications. Another anti-malware strategy is to deny permission to all Unknown applications. The problem with all these strategies is that all are far too general. Our solution's main component is as mentioned, an Extreme Network controlled Environment for Android Mobile. The network is most important in Android smart devices and it is the key for the data theft the malicious applications use the network to be spying the device and transfer the data through network and some hacking also done by network like honeypot. The second component is, also as mentioned, the RS Firewall Application use the afwall+ Server maintaining a iptables to provide secure network access to the applications, including their status and other statistics. A simplified version of the RS Firewall Application. By the Access of Super User, we can grand or revoke permissions to the installed applications. The android has the permission control feature by that we can grand the permission for that mode of safe network or revoke the permission for the mode of unknown network.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2728 Fig -1: Permissions Request flow 2. LITERATURE SURVEY 1) P. D. Meshram, Department of Information Technology, “SGGSIE&T Nanded” and Dr. R.C. Thool, Department of Information Technology, “SGGSIE&T Nanded” in Conference December 2014, DOI: 10.1109/GCWCN.2014.7030873. [1] The amount of malicious mobile application targeting Android based smartphones has increase rapidly. In addition, these malicious apps can download modules from servers which are run by malicious users, meaning that unexpected events can be activated inside of smartphones [3]. Therefore, the attacker can control and get personal information and data stored inside of smartphone illegally. Smartphones are not just phones but also portable computers, providing diverse services needed in life including calls, texts, emails, GPS, camera, Wi-Fi and Bluetooth apps. These apps keep and manage diverse intrinsic data as well as sensitive private information such as address books. Smartphones enable swift and easy data exchange via 3G, 4G and Wi-Fi. Thus, personal information stored on Smartphones is prone to leakage. 2) Caner Kilinc, Todd Booth, and Karl Andersson Pervasive and Mobile Computing Laboratory, “Luleå University of Technology” in 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. [9] ● WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS. ● Cloud keeping track of millions of applications and their reputation (good, bad, or unknown) and comparing traffic flows of applications with a list of known malicious IP servers. 3. PROPOSED SYSTEM Most of the people are using smart phone. So, Security for the Smart Phone is need most. Thus, we Proposed the system “ROOT SECURITY FIREWALL” (RS Firewall). Which can monitor other application activity mainly their android Network permission access and display them to user in the Application UI as simple check box. The user could decide the application is malware or not. The internet is main thing in hacking, so RS Firewall can grant and revoke network access to all applications in Rooted Android Platform. RS Firewall have the list of applications that’s installed in the Android Mobile. RS Firewall have the network permission access and it can grant or revoke network permission to other applications. Thus, RS Firewall made the Android device network transparent as check list to the user then the user can grant or revoke the network permission to all applications in android by this approach Android can access the network in control manner. Here we improve the Security of the Android device by network monitor firewall. RS Firewall have both white list approach and the blacklist approach by this it’s become handy in many situations. If we need only few application in the network we connected means we can use white list approach that only allow selected application to access the network else we need to block only some application means can use blacklist approach that restrict selected application from access the network and their network permission access and it can grand or revoke network permission to that selected applications. RS Firewall have the button on/off which is used to access the permission. RS Firewall can show the application access history(log) on Android Security permissions. By knowing the application Permission history user can block harmful permissions.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2729 Fig -2: Proposed Application 4. MODULE DESCRIPTION 4.1 Network Module: ● List of Application RS Firewall have the list of applications that’s installed in the Android Mobile. Fig - 3: List of applications and options ● Network Permission RS Firewall have the network permission access and it can grant or revoke network permission to other applications. ● Button RS Firewall have the button on/off which is used to access the permission. 4.2 Permission Module: ● List of Application RS Firewall have the list of application which in order of the installed time or its permissions based ● Network Types RS Firewall can show the application network access type on Android Security permissions like wifi, mobile data, lan. etc.. ● Block Permissions By knowing the application Permission history user can block harmful network access permissions.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2730 Fig - 4: Symbols used 5. CONCLUSION In this modern era, people have been using Smart devices particularly Android devices. There is no security in Android compare to the apple platform. who do not have a knowledge about androids their devices can easily hacked. The important factor of hacking is transmission medium, here it is networks. Hence RS Firewall ensures the security of the android platform that they control all other application networks Permissions by the Authority of Super User. It has simple user interface like checkbox So it is User Friendly. REFERENCE 1. A survey paper on vulnerabilities in Android OS and Security of Android Devices at: https://www.researchgate.net/publication/280096665 2. Afwall+ - https://apkpure.com/afwall-android-firewall/dev.ukanth.ufirewall. 3. Android API Guide - Permission, http://developer.android.com guide/topics/manifest/permissionelement.html. 4. Android Permission, https://android.googlesource.com/platform /frameworks /base/+/master/core/res/AndroidManifest.xml 5. Android Proguard, http://developer.android.com/tools/help/ proguard.html. 6. ContentProvider, http://developer.android.com/intl/ko/reference/android /content/ContentProvider.html. 7. Dalvik, http://ko.wikipedia.org/wiki/%EB%8B%AC%EB%B9%85_ (%EC%86%8C%ED%94%84%ED%8A%B8%EC%9B%A8%EC %96%B4. 8. Smali, http://code.google.com/p/smali/. 9. WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS -2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.