Sunteți pe pagina 1din 27

SECURE FOR HANDHELD DEVICES

AGAINST MALICIOUS SOFTWARE


IN MOBILE NETWORKS
Guided by,
Mr.KANNUDURAI

Presented by,
K.SURYA,
951513405019

AIM &OBJECTIVE

Deploying an efficient defense system to protect against


infection and to help the infected nodes to recover is
important to prevent serious spreading and outbreaks.

To optimally distribute the content-based signatures of


malware, which helps to detect the corresponding

malware.

Disable further propagation to minimize the number of


infected nodes.

PROJECT SIGNIFICANCE

Most probably the target for malware attacks such as


viruses,worms etc., in mobile networks.

The other reason is the emergence of mobile Internet,


which indirectly induces the malware.

In order to prevent this kind of attacks in mobile

networks,we provided this particularly in mobile


networks.

PROJECT IMPACT

Defense system distribute the optimal signature using special


nodes.

To deploy an efficient defense system to help infected nodes

to recover and prevent healthy nodes from further infection.

Avoiding whole network unnecessary redundancy using


distribute signatures.

The efficiency of our defense scheme in reducing the amount


of infected nodes in the system.

Security and authentication mechanisms should be considered.

LITERATURE SURVEY
TITLE

AUTHOR

ABSTRACT

DISADVANTAGES

Understanding the
spreading patterns
of mobile phone
viruses

P. Wang, M.
Gonzalez, C.
Hidalgo, and
A. Barabasi

We find that while

The Bluetooth virus to infect


all susceptible handsets

Bluetooth viruses can

reach all susceptible


handsets with time, they
spread slowly due to
human mobility, offering
ample opportunities to
deploy antiviral software

Maximum Damage M. Khouzani, S.


Malware Attack in Sarkar, and E.
Mobile Wireless
Altman
Networks

Malware attacks
constitute a serious
security risk that
threatens to slow down the
large-scale proliferation of
wireless applications.

The battery resources are


used according to a
decreasing function of time

LITERATURE SURVEY (CONT.)

TITLE

AUTHOR

ABSTRACT

DISADVANTAGES

SWIM: A Simple
Model to
Generate Small
Mobile Worlds

A. Mei and J.
Stefa.

This paper presents small


world in motion (SWIM),
a new mobility model for
ad-hoc networking

Small amount of data can be


transferred and limited
contact duration time

CPMC: An
Efcient
Proximity
Malware Coping
Scheme in
Smartphonebased Mobile
Networks

F. Li, Y. Yang, and


J. Wu

CPMC utilizes the social


community structure,
which reflects a stable and
controllable granularity of
security, in smart phonebased mobile networks

Each nodes own view is too


limited, and the signature
ooding is too costly.

Distributed
Caching over
Heterogeneous
Mobile Networks

S. Ioannidis, L.
Massoulie, and A.
Chaintreau

Sharing content over a


mobile network through
opportunistic contacts has
recently received
considerable attention

Users can retrieve content


only when they access
infrastructure or when
encounter other user storing
it.

SYSTEM ARCHITECTURE

Create Helper Node

Node
creation

Distribute
d
signatures
Using DTN
model

Analysis
Malware

Encounter
Malware

Performance
evaluation

IMPLEMENTATION AND CODE

MODULES:

Node Creation

Helper node Creation

Distribute Signatures

Malware Detection and Encounter

Performance Trace

MODULES DESCRIPTION:
Node Creation:

Create a mobile networks including a number of nodes. First


defined number of nodes and also defined source node,
destination node, intermediate nodes.

The network contains heterogeneous devices as nodes. Mobile

nodes are more efficient to disseminate content and information


in the network.

Helper node Creation:

Helper nodes are referred to as special nodes. Helper node is

intermediate node for every nodes in the network.

File can be transmit from source node to destination node through

the help of helpers node.


Distribute Signatures:

This module is used to analyzing the malware nodes through


passing the signatures.

Helper node distribute the signatures for every intermediate nodes


based on the file contents key will be generated.

Malware Detection and Encounter Malwares:

Detect the malware with the help of a content based signatures.

Exponential parameter obtained from the contact records


between helpers and general nodes.

Every intermediate node receive the signatures from helper


node and which intermediate nodes receiving the signatures
twice.

This time to detecting the malware spreading nodes and


recovering the infected nodes.

Performance Trace:

Simulate the malware spreading, and compare the simulation results


of infected ratio with that obtained by the model.

The number of infected nodes increases with the growth of spreading


rate can observe that the number of infected nodes decreases with the

increase of recovering rate.

For proximity malware propagation, we use both realistic mobility


trace and synthetic trace for simulations.

This modules determining the malware spreading time and malware


recovering time will be calculated using the signatures receive traces.

CONCLUSION
In this paper, we investigate the problem of optimal signature
distribution to defend mobile networks against the propagation
of both proximity and MMS-based malware.
We introduce a distributed algorithm that closely approaches
the optimal system performance of a centralized solution. To
optimally distribute the content-based signatures of malware,
which helps to detect the corresponding malware and disable
further propagation, to minimize the number of infected nodes.
Our goal is to minimize the malware infected nodes in the
system by appropriately allocating the limited storage with the
consideration of different types of malware.
Through both theoretical analysis and simulations, we
demonstrate the efficiency of our defense scheme in reducing
the amount of infected nodes in the system.

FUTURE ENHANCEMENT

Our scheme targets both the MMS and proximity malware at the
same time, and considers the problem of signature distribution.
Second, all these works assume that malware and devices are
homogeneous, we take the heterogeneity of devices into account in
deploying the system and consider the system resource limitations.
From the aspect of malware, since some sophisticated malware that
can bypass the signature detection would emerge with the
development of the defense system, new defense mechanisms will be
required.
At the same time, our work considers the case of OS-targeting
malware. Although most of the existing malware is OS targeted,
cross-OS malware will emerge and propagate in the near future. How
to efficiently deploy thecurrent defense system with the
consideration of cross-OS malware is another important problem

REFERENCES
P. Wang, M. Gonzalez, C. Hidalgo, and A. Barabasi, Understanding the Spreading Patterns of Mobile Phone
Viruses,Science,vol. 324, no. 5930, pp. 1071-1076.
M.
Hypponen, Mobile Malwar,Proc. 16th USENIX
SecuritySymp.
G. Lawton, On the Trail of the Conficker Worm , Computer,
vol. 42, no. 6, pp. 19-22.
Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, A Social
Network Based Patching Scheme for Worm Containment in
Cellular Networks,Proc. IEEE INFOCOM.

S-ar putea să vă placă și