SlideShare a Scribd company logo
Research in Progress- Defending Android Smartphones
from Malware Attacks
ABSTRACT:
Smartphones are becoming enriched with confidential information due to their
powerful computational capabilities and attractive communications features. The
Android smartphone is one of the most widely used platforms by businesses and
users alike. This is partially because Android smartphones use the free, open-
source Linux as the underlying operating system, which allows development of
applications by any software developer. This research study aims to explore
security risks associated with the use of Android smartphones and the sensitive
information they contain; the researcher devised a survey questionnaire to
investigate and further understand security threats targeting Android smartphones.
The survey also intended to study the scope of malware attacks targeting Android
phones and the effectiveness of existing defense measures. The study surveyed the
average Android users as the target population to understand how they perceive
security and what security controls they use to protect their smartphones.
EXISTING SYSTEM:
A focused review of the literature reveals that there have been many protection
strategies offered for securing smartphones and ensuring user privacy; however,
most of those endeavors are small-scale and tackle particular areas of protection,
such as access control and anomaly detection.
DISADVANTAGES OF EXISTING SYSTEM:
Malware attacks on smartphones were generally “proof of concept” attempts to
break to the phone’s system and cause damage. However, the new generation of
smartphone malware attacks has increased in sophistication and is designed to
cause severe financial losses (caused by identity theft) and disruption of critical
software applications.
Most of those endeavors are small-scale and tackle particular areas of protection,
such as access control and anomaly detection.
PROPOSED SYSTEM:
The primary goal of this research study is to investigate security risks associated
with the use of Android smartphones and then propose to design an effective,
realtime, integrated defense framework for Android smartphones. This study will
contribute to identifying top security threats facing Android phones and the
confidential information they contain.
ADVANTAGES OF PROPOSED SYSTEM:
The proposed solution will detect attacks (viruses, worms, and Trojan horses) and
prompt users to take actions to prevent breaches; any suspicious activity that may
reveal personal information to third parties or unknown entities will be reported to
users to prevent potential attacks.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
 MOBILE : ANDROID
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP.
 Coding Language : Java 1.7
 Tool Kit : Android 2.3
 IDE : Eclipse
REFERENCE:
Dr.Marwan Omar, Dr.Maurice Dawson, “Research in Progress- Defending
Android Smartphones from Malware Attacks”, IEEE 2013 Third International
Conference on Advanced Computing & Communication Technologies.

More Related Content

PDF
Smartphone Ownage: The state of mobile botnets and rootkits
PPTX
Mobile security
PDF
Top 6-Security-Threats-on-iOS
PDF
Mobile Security
PDF
Malicious malware breaches - eScan
PPTX
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
PDF
Mobile Security 101
PPTX
Mobile security by Tajwar khan
Smartphone Ownage: The state of mobile botnets and rootkits
Mobile security
Top 6-Security-Threats-on-iOS
Mobile Security
Malicious malware breaches - eScan
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
Mobile Security 101
Mobile security by Tajwar khan

What's hot (20)

PPTX
Mobile security
PPTX
Mobile security
PPT
Smart phone and mobile device security
 
PPTX
Mobile security
PDF
CTO Cybersecurity Forum 2013 David Turahi
PPTX
Mobile security
PPTX
Ms810 assignment viruses and malware affecting moblie devices
PDF
Mobile phone security
PDF
New trends in Payments Security: NFC & Mobile
PPTX
Security models of modern mobile systems
PPT
cellphone virus and security
PPTX
cell phone viruses and security
PPTX
Mobile Attacks Target iOS and Android | State of the Internet Presentation
PDF
Spy android malware - eScan
PDF
BETTER- Threat Whitepaper- PoS
PDF
Cscu module 13 securing mobile devices
PDF
Can You Steal From Me Now? Mobile and BYOD Security Risks
PPT
Cell Phone Viruses & Security
PDF
Report on Mobile security
PDF
Improving your mobile threat defense strategy
Mobile security
Mobile security
Smart phone and mobile device security
 
Mobile security
CTO Cybersecurity Forum 2013 David Turahi
Mobile security
Ms810 assignment viruses and malware affecting moblie devices
Mobile phone security
New trends in Payments Security: NFC & Mobile
Security models of modern mobile systems
cellphone virus and security
cell phone viruses and security
Mobile Attacks Target iOS and Android | State of the Internet Presentation
Spy android malware - eScan
BETTER- Threat Whitepaper- PoS
Cscu module 13 securing mobile devices
Can You Steal From Me Now? Mobile and BYOD Security Risks
Cell Phone Viruses & Security
Report on Mobile security
Improving your mobile threat defense strategy
Ad

Viewers also liked (19)

DOCX
Trusted db a trusted hardware based database with privacy and data confidenti...
DOCX
A generalized flow based method for analysis of implicit relationships on wik...
DOCX
Optimal multicast capacity and delay tradeoffs in mane ts
DOCX
A probabilistic misbehavior detection scheme towards efficient trust establis...
DOCX
Load rebalancing for distributed file systems in clouds
DOCX
Clustering sentence level text using a novel fuzzy relational clustering algo...
DOCX
A rank correlation based detection against distributed reflection do s attacks
DOCX
An efficient and robust addressing protocol for node autoconfiguration in ad ...
DOCX
A load balancing model based on cloud partitioning for the public cloud
PDF
2013 2014 ieee java project titles
DOCX
Localization of wireless sensor networks in the wild pursuit of ranging quality
DOCX
M privacy for collaborative data publishing
DOCX
Enhanced olsr for defense against dos attack in ad hoc networks
PDF
2013 14 ieee matlab titles
DOCX
Delay based network utility maximization
DOCX
Intrusion detection technique by using k means, fuzzy neural network and svm ...
DOCX
Cam cloud assisted privacy preserving mobile health monitoring
DOCX
Scalable and secure sharing of personal health records in cloud computing usi...
DOCX
Toward accurate mobile sensor network localization in noisy environments
Trusted db a trusted hardware based database with privacy and data confidenti...
A generalized flow based method for analysis of implicit relationships on wik...
Optimal multicast capacity and delay tradeoffs in mane ts
A probabilistic misbehavior detection scheme towards efficient trust establis...
Load rebalancing for distributed file systems in clouds
Clustering sentence level text using a novel fuzzy relational clustering algo...
A rank correlation based detection against distributed reflection do s attacks
An efficient and robust addressing protocol for node autoconfiguration in ad ...
A load balancing model based on cloud partitioning for the public cloud
2013 2014 ieee java project titles
Localization of wireless sensor networks in the wild pursuit of ranging quality
M privacy for collaborative data publishing
Enhanced olsr for defense against dos attack in ad hoc networks
2013 14 ieee matlab titles
Delay based network utility maximization
Intrusion detection technique by using k means, fuzzy neural network and svm ...
Cam cloud assisted privacy preserving mobile health monitoring
Scalable and secure sharing of personal health records in cloud computing usi...
Toward accurate mobile sensor network localization in noisy environments
Ad

Similar to Research in progress defending android smartphones from malware attacks (20)

PDF
Penetration Testing for Android Smartphones
PDF
Android open-source operating System for mobile devices
PDF
Forensic Tool for Android Mobile Device
PDF
Android security
PDF
Android security
PPTX
Malware Improvements in Android OS
PPTX
Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation A...
PDF
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
PDF
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
PPTX
AndroidSecurityFirstEvaluationbyMJs.pptx
PDF
A017360104
PDF
Comparative Study on Intrusion Detection Systems for Smartphones
PDF
A Systematic Review of Android Malware Detection Techniques
PDF
Android malware
PDF
Android malware
DOCX
Catch me if you can evaluating android anti malware against transformation at...
PDF
Android Security: A Survey of Security Issues and Defenses
PDF
Android security a survey of issues, malware penetration, and defenses
PDF
A survey on android security: development and deployment hindrance and best p...
PPTX
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones
Penetration Testing for Android Smartphones
Android open-source operating System for mobile devices
Forensic Tool for Android Mobile Device
Android security
Android security
Malware Improvements in Android OS
Catch Me If You Can- Evaluating Android Anti-Malware Against Transformation A...
Android Malware: Study and analysis of malware for privacy leak in ad-hoc net...
HONEYPOTLABSAC: A VIRTUAL HONEYPOT FRAMEWORK FOR ANDROID
AndroidSecurityFirstEvaluationbyMJs.pptx
A017360104
Comparative Study on Intrusion Detection Systems for Smartphones
A Systematic Review of Android Malware Detection Techniques
Android malware
Android malware
Catch me if you can evaluating android anti malware against transformation at...
Android Security: A Survey of Security Issues and Defenses
Android security a survey of issues, malware penetration, and defenses
A survey on android security: development and deployment hindrance and best p...
Lab Meeting - 20140902 - Root Guard-Protecting Rooted Android Phones

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Insiders guide to clinical Medicine.pdf
PPTX
master seminar digital applications in india
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Cell Types and Its function , kingdom of life
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Business Ethics Teaching Materials for college
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Classroom Observation Tools for Teachers
PDF
01-Introduction-to-Information-Management.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
Module 4: Burden of Disease Tutorial Slides S2 2025
Microbial disease of the cardiovascular and lymphatic systems
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
TR - Agricultural Crops Production NC III.pdf
Insiders guide to clinical Medicine.pdf
master seminar digital applications in india
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPH.pptx obstetrics and gynecology in nursing
Cell Types and Its function , kingdom of life
Supply Chain Operations Speaking Notes -ICLT Program
Final Presentation General Medicine 03-08-2024.pptx
Business Ethics Teaching Materials for college
VCE English Exam - Section C Student Revision Booklet
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Classroom Observation Tools for Teachers
01-Introduction-to-Information-Management.pdf

Research in progress defending android smartphones from malware attacks

  • 1. Research in Progress- Defending Android Smartphones from Malware Attacks ABSTRACT: Smartphones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smartphone is one of the most widely used platforms by businesses and users alike. This is partially because Android smartphones use the free, open- source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smartphones and the sensitive information they contain; the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smartphones. The survey also intended to study the scope of malware attacks targeting Android phones and the effectiveness of existing defense measures. The study surveyed the average Android users as the target population to understand how they perceive security and what security controls they use to protect their smartphones. EXISTING SYSTEM: A focused review of the literature reveals that there have been many protection strategies offered for securing smartphones and ensuring user privacy; however,
  • 2. most of those endeavors are small-scale and tackle particular areas of protection, such as access control and anomaly detection. DISADVANTAGES OF EXISTING SYSTEM: Malware attacks on smartphones were generally “proof of concept” attempts to break to the phone’s system and cause damage. However, the new generation of smartphone malware attacks has increased in sophistication and is designed to cause severe financial losses (caused by identity theft) and disruption of critical software applications. Most of those endeavors are small-scale and tackle particular areas of protection, such as access control and anomaly detection. PROPOSED SYSTEM: The primary goal of this research study is to investigate security risks associated with the use of Android smartphones and then propose to design an effective, realtime, integrated defense framework for Android smartphones. This study will contribute to identifying top security threats facing Android phones and the confidential information they contain.
  • 3. ADVANTAGES OF PROPOSED SYSTEM: The proposed solution will detect attacks (viruses, worms, and Trojan horses) and prompt users to take actions to prevent breaches; any suspicious activity that may reveal personal information to third parties or unknown entities will be reported to users to prevent potential attacks. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.  MOBILE : ANDROID SOFTWARE REQUIREMENTS:  Operating system : Windows XP.  Coding Language : Java 1.7
  • 4.  Tool Kit : Android 2.3  IDE : Eclipse REFERENCE: Dr.Marwan Omar, Dr.Maurice Dawson, “Research in Progress- Defending Android Smartphones from Malware Attacks”, IEEE 2013 Third International Conference on Advanced Computing & Communication Technologies.