Mobile Viruses
نویسندگان
چکیده
It has just been seven years since the time when first virus was introduced in a game „Mosquito‟ by a company called as Ojam. Ever since then, malware has been introduced in various ways and affecting MCDs (Mobile Computing Devices) all over the world. It has been an issue of great concern since it invades into the privacy of mobile users. Once installed in the victim‟s phone it can track the user‟s location via GPS, call other people, send SMS/MMS, gain unauthorized access to the resources or even use the mobile remotely over the 3G/Wi-Fi Internet connection. It can also cause the user to have a monetary loss without the owner even knowing anything about it. Malware can be categorized into various types-Virus, Worms, Trojan horse, Spyware, etc. They are transferred to the device by emails, messages and downloaded files. One of the characteristics of malware is self-duplication, where it creates replicas inside the device without the user noticing it. Malware can be any type of code, script, executable file or software. The malware writers have not spared any Mobile Operating System, be it Symbian (Nokia), iOS iPhone OS, Android OS, Blackberry or Windows OS. Some of these viruses are Cabir, CommWarrior (Symbian), Rick Astley virus (iOS-iPhone OS) and SMS.AndroidOS.FakePlayer (Android OS). In this paper, we have analyzed the different types of malware and their effects on Symbian, iOS & Android, Windows, Blackberry devices. We have also suggested ways to detect and remove them.
منابع مشابه
A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus
According to the propagation and destruction characteristics of mobile phone viruses, a virus detection model based on the Danger Theory is proposed. This model includes four phases: danger capture, antigen presentation, antibody generation and antibody distribution. In this model, local knowledge of mobile phones is exploited by the agents that are running in mobile phones to discover danger c...
متن کاملUnderstanding the spreading patterns of mobile phone viruses
We modeled the mobility of mobile phone users in order to study the fundamental spreading patterns that characterize a mobile virus outbreak. We find that although Bluetooth viruses can reach all susceptible handsets with time, they spread slowly because of human mobility, offering ample opportunities to deploy antiviral software. In contrast, viruses using multimedia messaging services could i...
متن کاملArtificial hygiene: Non-proliferation of viruses in cellular networks
Viruses, worms, Trojan horses, spywares have been effective for quite sometime in the domain of digital computers. These malicious software cause millions of dollars of loss in assets, revenue, opportunity, cleanup cost, and lost productivity. To stop virus attacks, organizations frame up different security policies. These policies work only within the limited domain of the organization’s netwo...
متن کاملNew generation of mobile phone viruses and corresponding countermeasures
The fast growing market for smart phones coupled with their almost continuous online presence makes these devices the new targets of virus writers. It has been recently found that the topological spread of MMS (Multimedia Message Services) viruses is highly restricted by the underlying fragmentation of the call graph. In this paper, we study MMS viruses under another type of spreading behavior:...
متن کاملWhy Protection against Viruses, Bots, and Worms is so hard – Malware seen as Mobile Agents
Viruses, bots, worms, etc. are nothing else but mobile agents. Mobile agents in turn have been the scope of research in computer sciences for quite some years. Recently research on the security side of mobile agents has received increased attention, too. Perfectly securing mobile agents is generally impossible. While this is cumbersome for legitimate scenarios this is good news when trying to p...
متن کاملModeling the Propagation of Mobile Phone Virus under Complex Network
Mobile phone virus is a rogue program written to propagate from one phone to another, which can take control of a mobile device by exploiting its vulnerabilities. In this paper the propagation model of mobile phone virus is tackled to understand how particular factors can affect its propagation and design effective containment strategies to suppress mobile phone virus. Two different propagation...
متن کامل