International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 04 | Apr -2017
www.irjet.net
e-ISSN: 2395 -0056 p-ISSN: 2395-0072
Android based malware propagation and detection in mobile system S.Anitha1, S.Giridharan 2, P.Hemalatha3 Scholar Department of Information Technology IFET College of Engineering , Anna University, India. 2&3Assistant Professor, Department of Information Technology IFET College of Engineering , Anna University, India. 1U.G
---------------------------------------------------------------------***--------------------------------------------------------------------around the world to reveal their skills and come up Abstract - Now a day’s the smartphones have become with new packages for Android telephones. Its users the most important device for everyone. The smartphone users perform many online tasks including have a huge sort of packages to choose from and can web browsing, Internet banking and share the customize their phones for a private revel in. The documents through Internet , SMS services. Currently Android working gadget has been at the upward in the smartphone market, Android is the platform with thrust with the increase malware hazard for mobile the highest share. Even in the 21st century where the phones functionality As the maximum popular technology is rapidly growing and simultaneously the cellular platform, Google’s Android overtook others increasing use of smartphone has been attracting the to emerge as the pinnacle cell malware platform. It attention of malware writers, for these issues the has been highlighted that “among all cell malware, smartphone users are looking for security solutions the proportion of Android-based malware is better aimed to develop a android app and also use a slicing than forty six% and nonetheless developing mechanism to detect and prevent the mobile malware .and also aims to improvement towards current unexpectedly.” [6] Another recent file also alerts that techniques for better mobile malware detection and there's “400 percentage boom in Android-primarily detect the virus before enter into the smartphone. based malware in view that solstice 2010”. Given the wild boom of Android malware, there may be a Key Words: Smart phone, Android app, Malware, pressing need to successfully mitigate or guard in Mobile Malware Detection and Prevent. opposition to them. For this, the android circle of 1. INTRODUCTION relatives is characterized based on their precise In recent years, the smart phones are worldwide conduct breakdown, along with the set up, activation, market has grown dramatically. According to CNN and payloads. To cater to this, a dataset of forty nine smartphone shipments have tripled in the past three families of android malware, discovered from Aug years (from 40 million to about 120 million). In a 2010 to Sept 2011[1], had been considered. However, very short time Google's mobile operating system without an insightful expertise of the android’s Android has become the number one choice for underlying framework and its safety mechanisms, it's smartphones. Google’s Android contributes to almost far tough to imagine an effective mitigation solution 75% of the mobile OS market share [5]. There are may be practically evolved. three reasons for this famous. Firstly, Android is 2. MALWARE Open Source. This open source code and permissive The malware are termed as malicious software this licensing allows the software to be freely modified is designed especially to target a cell device gadget, and distributed by device manufacturers, wireless such as a tablet or smartphone to harm or disrupt the carriers and enthusiast developers. Secondly, tool. The maximum cellular malware is designed to Android is free. Android, since the day it was disable a cellular device, allow a malicious consumer launched, has been available free of cost and Google to remotely control the device or to souse borrow made it clear so that it will be a free in future. The OS non-public facts saved on the device .Once malware caught the attention of manufacturers across the gets itself into the device through different media like world and many initially adopted it for low cost copying of documents from outside devices onto the smart phones. Thirdly, Android Market created an device and by and large by downloading files from possibility for tens of millions of software developers the net, it assessments the vulnerabilities of the © 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 339