Intercepting the malevolent sms in android devices

  • Authors

    • A Lashya Pravallika
    • B Bhargavi
    • Ch Harshit
    • Dr K. V. D. Kiran
    2018-03-18
    https://doi.org/10.14419/ijet.v7i2.7.12221
  • Malicious, SMS, Android Devices, Framework.
  • Currently, In the mobile operating system Android is trending in the whole world.Though the designers of Android are working much on the security there are few attacks on the messaging framework which are really dangerous. In this paper we also present these attacks. Our focus is on SMS, USSD, and the evolution of their associated security in Android and accordingly the development of related attacks,Also we discuss here the main features and vulnerabilities of Android OS that allow the development and infection by SMS malware.If the SMS is considered as the normal, then it does not take any action and it send to the end user after the delay expires. To deal with this type of issues,we proposed a method where the end user behaviour can be adjusted to prevent the totally malicious SMS.

     

     

  • References

    1. [1] Mao, Qiushi. 2015. Experimental Studies of Human Behavior in Social Computing Systems. Doctoral dissertation, Harvard University, Graduate School of Arts & Sciences.

      [2] Al-Omany, M., Al-Muhtadi, J., & Derhab, A. (2015). Detection of SMS spam Botnets in mobile devices: Design, analysis, implementation. In LAP LAMBERT. Academic Publishing.

      [3] Allalouf, M., Ben-Av, R., & Gerdov, A. (2014). Storedroid: sensor-based data protection framework for android. In International wireless communications andMobile computing conference (IWCMC 2014).

      [4] Almohri, H. M., Yao, D. D., & Kafura, D. (2014). Droidbarrier: know what is executing on your android. In Proceedings of the 4th ACM conference on data and application security and privacy (CODASPY'14) (pp. 257e264).

      [5] Arzt, S.Rasthofer, S., Fritz, C., Bodden, E., Bartel, A., Klein, J., et al. (2014). Flowdroid:precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps. ACM SIGPLAN Notices, 49(6), 259e269.

      [6] Batyuk, L., Herpich, M., Camtepe, S., Raddatz, K., Schmidt, A.-D., & Albayrak, S.(2011). Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within android applications. In 6th international conference on malicious and unwanted software (MALWARE 2011) (pp. 66e72).

      [7] Bierma, M., Gustafson, E., Erickson, J., Fritz, D., & Choe, Y. R. (2014). Andlantis: large-scale android dynamic analysis. In Security and privacy workshops: Mobile security technologies (MoST).

      [8] Crowdroid: behavior-basedmalware detection system for android. In Proceedings of the 1st ACM work-shop on security and privacy in smartphones and mobile devices (SPSM '11) (pp15e26).Cloudmark.

      [9] K.V.D.KIRAN,â€Integrated Distributed Architecture to Integrate Wireless Sensor Networks (WSN) with Grid for Healthcare,†International Journal of Bio-Science and Bio-Technologyâ€, Vol.7, No.3 (2015), pp.243-250, ISSN: 2233-7849 IJBSBT.

      [10] K.V.D.KIRAN,â€A Critical study of information security risk assessment using fuzzy and entropy methodologies,†International Journal on Computers and Communicationsâ€, Pages: 17-22,Vol1,Isuue1,Dec-,12, ISSN: 2319 – 8869.

      [11] K.V.D.KIRAN,†“Literature Review on Risk Literature Review on Risk and their Components†International Journal for Research in Emerging Science and Technology (IJREST) “,Volume-1, Issue-6, November 2014â€, (e-ISSN 2349-7610)..

      [12] K.V.D.KIRAN, â€Performance Analysis of Layered Architecture to Integrate Mobile Devices and Grid computing with a resource scheduling algorithmâ€, IEEE CS’07, SIVAKASI, TAMIL NADU, India.

      [13] Khodor hamandi, Ala Salma, “Messaging attacks on Andriods vulnerabilities and intrusion detectionâ€, Feb 2014.

  • Downloads

  • How to Cite

    Lashya Pravallika, A., Bhargavi, B., Harshit, C., & K. V. D. Kiran, D. (2018). Intercepting the malevolent sms in android devices. International Journal of Engineering & Technology, 7(2.7), 1030-1033. https://doi.org/10.14419/ijet.v7i2.7.12221