Prevention of Malicious Attack on Smart Phones using Amendment Capture Service

Sensitive data and information is at a greater risk due to the exploitation of the smart phones by Malwares. Malwares that once targeted the computers are now fully designed to extract all the information possible from the mobile phones. This work focuses on preventing the malicious attack on the mobile phones by using Amendment capture service, which checks the smart phone periodically or when a change has taken place and executes the DtKFc algorithm to detect the malicious applications. General Terms Machine Learning, Decision tree Algorithm, K-fold Algorithm, Amendment Capture Algorithm.

[1]  Lior Rokach,et al.  Improving malware detection by applying multi-inducer ensemble , 2009, Comput. Stat. Data Anal..

[2]  Yuval Elovici,et al.  Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method , 2010, J. Syst. Softw..

[3]  Gabriel Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[4]  Joseph G. Tront,et al.  Mobile Device Profiling and Intrusion Detection Using Smart Batteries , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).

[5]  Tzi-cker Chiueh,et al.  Automatic Generation of String Signatures for Malware Detection , 2009, RAID.

[6]  Eric Filiol,et al.  Behavioral detection of malware: from a survey towards an established taxonomy , 2008, Journal in Computer Virology.

[7]  J. Foster,et al.  SCanDroid: Automated Security Certification of Android , 2009 .

[8]  Yuval Elovici,et al.  Securing Android-Powered Mobile Devices Using SELinux , 2010, IEEE Security & Privacy.

[9]  Kang G. Shin,et al.  Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.

[10]  Yuval Elovici,et al.  “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.

[11]  Avik Chaudhuri,et al.  SCanDroid: Automated Security Certification of Android , 2009 .

[12]  Yuval Elovici,et al.  Google Android: A State-of-the-Art Review of Security Mechanisms , 2009, ArXiv.