You are on page 1of 29

SECURE FOR HANDHELD DEVICES

AGAINST MALICIOUS SOFTWARE


IN MOBILE NETWORKS
Guided by,
Mr.KANNUDURAI

Presented by,
K.SURYA,
951513405019

AIM &OBJECTIVE

Deploying an efficient defense system to protect against


infection and to help the infected nodes to recover is
important to prevent serious spreading and outbreaks.

We introduce an optimal distributed solution

to

efficiently avoid malware spreading and help to infected


nodes to recover

PROJECT SIGNIFICANCE
o

Optimally distribute the content-based signatures of


malware, which helps to detect the corresponding
malware .

Designing a defense system for both MMS and


proximity malware.

Introducing an optimal distributed solution to efficiently


keep away from malware spreading which also involves
to help infected nodes to recover.

LITERATURE SURVEY
TITLE

AUTHOR

ABSTRACT

DISADVANTAGES

Understanding the
spreading patterns
of mobile phone
viruses

P. Wang, M.
Gonzalez, C.
Hidalgo, and
A. Barabasi

We find that while

The Bluetooth virus to infect


all susceptible handsets

Bluetooth viruses can


reach all susceptible
handsets with time, they
spread slowly due to
human mobility, offering
ample opportunities to
deploy antiviral software

Maximum Damage M. Khouzani, S.


Malware Attack in Sarkar, and E.
Mobile Wireless
Altman
Networks

Malware attacks
constitute a serious
security risk that
threatens to slow down the
large-scale proliferation of
wireless applications.

The battery resources are


used according to a
decreasing function of time

LITERATURE SURVEY (CONT.)


TITLE

AUTHOR

ABSTRACT

DISADVANTAGES

SWIM: A Simple
Model to
Generate Small
Mobile Worlds

A. Mei and J.
Stefa.

This paper presents small


world in motion (SWIM),
a new mobility model for
ad-hoc networking

Small amount of data can be


transferred and limited
contact duration time

CPMC: An
Efcient
Proximity
Malware Coping
Scheme in
Smartphonebased Mobile
Networks

F. Li, Y. Yang, and


J. Wu

CPMC utilizes the social


community structure,
which reflects a stable and
controllable granularity of
security, in smart phonebased mobile networks

Each nodes own view is too


limited, and the signature
ooding is too costly.

Distributed
Caching over
Heterogeneous
Mobile Networks

S. Ioannidis, L.
Massoulie, and A.
Chaintreau

Sharing content over a


mobile network through
opportunistic contacts has
recently received
considerable attention

Users can retrieve content


only when they access
infrastructure or when
encounter other user storing
it.

SYSTEM ARCHITECTURE

Create Helper Node

Node
creation

Analysis
Malware

Distributed
signatures

Using DTN
model

Encounter
Malware

Performance
evaluation

IMPLEMENTATION
MODULES:

Node Creation

Helper node Creation

Distribute Signatures

Malware Detection and Encounter

Performance Trace

MODULES DESCRIPTION:
Node Creation:

Create a mobile networks including a number of nodes. First


defined number of nodes and also defined source node,
destination node, intermediate nodes.

The network contains heterogeneous devices as nodes. Mobile


nodes are more efficient to disseminate content and information

in the network.

Helper node Creation:

Helper nodes are referred to as special nodes. Helper node is

intermediate node for every nodes in the network.

File can be transmit from source node to destination node through


the help of helpers node.

Distribute Signatures:

This module is used to analyzing the malware nodes through

passing the signatures.

Helper node distribute the signatures for every intermediate nodes


based on the file contents key will be generated.

Malware Detection and Encounter Malwares:

Detect the malware with the help of a content based signatures.

Exponential parameter obtained from the contact records


between helpers and general nodes.

Every intermediate node receive the signatures from helper


node and which intermediate nodes receiving the signatures
twice.

This time to detecting the malware spreading nodes and


recovering the infected nodes.

Performance Trace:

Simulate the malware spreading, and compare the simulation results


of infected ratio with that obtained by the model.

The number of infected nodes increases with the growth of spreading


rate can observe that the number of infected nodes decreases with the
increase of recovering rate.

For proximity malware propagation, we use both realistic mobility


trace and synthetic trace for simulations.

This modules determining the malware spreading time and malware


recovering time will be calculated using the signatures receive traces.

EXPECTED OUTCOMES

Defense system distribute the optimal signature using special

nodes.

To deploy an efficient defense system to help infected nodes to


recover and prevent healthy nodes from further infection.

Avoiding whole network unnecessary redundancy using distribute


signatures.

The efficiency of our defense scheme in reducing the amount of


infected nodes in the system.

Security and authentication mechanisms should be considered.

EXPERIMENTAL RESULTS

PERFORMANCE GRAPH

COMPARISONS WITH EXISTING SYSTEM

Defense system distribute the optimal signature using special


nodes.

To deploy an efficient defense system to help infected nodes to


recover and prevent healthy nodes from further infection.

Avoiding whole network unnecessary redundancy using


distribute signatures.

The efficiency of our defense scheme in reducing the amount


of infected nodes in the system.

Security and authentication mechanisms should be considered.

CONCLUSION & FUTURE ENHANCEMENT


In this paper, we investigate the problem of optimal signature
distribution to defend mobile networks against the propagation
of both proximity and MMS-based malware.
Through both theoretical analysis and simulations, we
demonstrate the efficiency of our defense scheme in reducing
the amount of infected nodes in the system.
Our scheme targets both the MMS and proximity malware at
the same time, and considers the problem of signature
distribution.
At the same time, our work considers the case of OS-targeting
malware. Although most of the existing malware is OS targeted,
cross-OS malware will emerge and propagate in the near future.
How to efficiently deploy thecurrent defense system with the
consideration of cross-OS malware is another important problem

REFERENCES
P. Wang, M. Gonzalez, C. Hidalgo, and A. Barabasi, Understanding the Spreading Patterns of Mobile Phone
Viruses,Science,vol. 324, no. 5930, pp. 1071-1076.
M.
Hypponen, Mobile Malwar,Proc. 16th USENIX
SecuritySymp.
G. Lawton, On the Trail of the Conficker Worm , Computer,
vol. 42, no. 6, pp. 19-22.
Z. Zhu, G. Cao, S. Zhu, S. Ranjan, and A. Nucci, A Social
Network Based Patching Scheme for Worm Containment in
Cellular Networks,Proc. IEEE INFOCOM.

You might also like