A Survey On Restraining Virus Propagation In Mobile Networks
نویسندگان
چکیده
Mobile communication systems are becoming increasingly significant and ubiquitous in people’s daily lives. Due to the enormous growth in mobile devices, virus propagation in mobile virus is an important security concern. A mobile virus is nothing but malicious computer software that targets mobile phones and causing the collapse of the system and leakage of confidential information. In the wireless communication viruses can even jam wireless services by transmitting thousands of spam messages and diminish the quality of voice communication. Because of the virus propagation, there is leakage of privacy data, additional service charges and exhaustion of battery power. These malware or virus is cell-phone worms that are malicious codes that exploit vulnerabilities in cell-phone software and propagate in networks via popular services such as Bluetooth and Multimedia Messaging Service (MMS). Worms are devastating to both users and network. A user can be instinctively charged for several messages created by the worm and the phone battery will be rapidly drained. Other reported worm damages expand from stealing user data and privacy to destroying hardware. Due to the severe damages of the mobile virus, it is significant for the users to gain a deep understanding of the propagation mechanisms of mobile viruses. So, in these circumstances there is a critical requirement for both users and service providers to further recognize the propagation mechanisms of mobile viruses and to deploy proficient countermeasures. Key terms: Mobile Networks, Phone virus, virus propagation, security, malware
منابع مشابه
Hybrid Model for Detecting Viruses in Mobile Networks
Malware is malicious software which disturbs the network computer operation, hacking the sensitive information and accesses the private systems. It is nothing but a program which is specifically designed to injure the computer it may be a virus or worm. So, in order to overcome this problem a two-layer network model is presented for simulating virus propagation through both Bluetooth and SMS. T...
متن کاملA Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks
In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...
متن کاملVehicular Networks: A Survey on Architecture, Communication Technologies and Applications
The Intelligent Transportation System (ITS) provides wireless and mobile communication between vehicles and infrastructure to improve the safety of transportation and make the journey more enjoyable. This system consists of many fixed and mobile nodes (Vehicles, Trains, Vessels, Air planes), Wireless and Wired Telecommunication Technologies to exchange information between mobile nodes or betwee...
متن کاملHybrid Model for Detecting Malware in Mobile Networks with Heterogeneous Devices
Malware attacks become more frequently in cellular networks (i e., viruses, worms, and also other malicious software). Spyware which disturbs your network computer function, hacking the hypersensitive information and accesses your private systems. It is only a program that's specifically designed to be able to injure the computer it can be a virus or perhaps worm. Mobile malware can propagate v...
متن کاملDynamic Obstacle Avoidance by Distributed Algorithm based on Reinforcement Learning (RESEARCH NOTE)
In this paper we focus on the application of reinforcement learning to obstacle avoidance in dynamic Environments in wireless sensor networks. A distributed algorithm based on reinforcement learning is developed for sensor networks to guide mobile robot through the dynamic obstacles. The sensor network models the danger of the area under coverage as obstacles, and has the property of adoption o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014