Abstract
There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attacking model on mobile phone adapted from malicious attack on computer. It also presents the types of attack and appropriate solution model for mobile phone. A prototype of the simulation of malicious software and detection software on mobile devices is developed and the results of applying this approach to simulated malicious software and detection software on mobile device are also presented.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Davis, R.: Exploring computer viruses. In: Fourth Aerospace Computer Security Applications Conference, December 12-16, pp. 7–11 (1988)
Slade, R.: Guide to computer viruses, 2nd edn. Springer, New York (1996)
Jamaluddin, J., Zotou, N., Coulton, P.: Mobile phone vulnerabilities: a new generation of malware. In: 2004 IEEE International Symposium On Consumer Electronics, September 1-3, pp. 199–202 (2004)
Dagon, D., Martin, T., Starner, T.: Mobile Phones as Computing Devices: The Viruses are Coming!, Pervasive Computing. IEEE 3(4), 11–15 (2004)
Gupta, V., Gupta, S.: Securing the wireless internet. IEEE Communication Magazine 39(12), 68–74 (2001)
eFinland. Preparing for Mobile Phone Viruses [Online] (November 1, 2004), Available: http://www.e.finland.fi/netcomm/news/showarticle.asp?intNWSAID=29431
BluejackQ (No Date). What is Bluejacking [Online]. Available: http://www.bluejackq.com/what-is-bluejacking.shtml
BBC News World Edition. Mobile Virus Threat Looms Large [Online] Available: http://news.bbc.co.uk/2/hi/technology/2690253.stm
Belson, K.: A Brand New Worry: Mobile Phone Viruses, International Herald Tribune: The IHT Online Available: http://www.iht.com/cgibin/generic.cgi?template=articleprint.tmplh&ArticleID=119373
Ludwig, M.A.: Black Book of Computer Viruses. American Eagle Publication, Inc. (1995)
Ellen, M.: Behavior blocking repels new viruses [Online] (February 1, 2002), Available: http://www.nwfusion.com/news/2002/0128antivirus.html
Denning, D.: An Intrusion-Detection Model. IEEE Transactions on Software Engineering 13(2), 222–232 (1987)
Teng, H., Chen, K., Lu, S.: Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns. In: Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy, pp. 278–284 (May 1990)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yap, T.S., Ewe, H.T. (2005). A Mobile Phone Malicious Software Detection Model with Behavior Checker. In: Shimojo, S., Ichii, S., Ling, TW., Song, KH. (eds) Web and Communication Technologies and Internet-Related Social Issues - HSI 2005. HSI 2005. Lecture Notes in Computer Science, vol 3597. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11527725_7
Download citation
DOI: https://doi.org/10.1007/11527725_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-27830-6
Online ISBN: 978-3-540-31808-8
eBook Packages: Computer ScienceComputer Science (R0)