SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Downloaden Sie, um offline zu lesen
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME

ENGINEERING AND TECHNOLOGY (IJARET)

ISSN 0976 - 6480 (Print)
ISSN 0976 - 6499 (Online)
Volume 4, Issue 6, September – October 2013, pp. 238-245
© IAEME: www.iaeme.com/ijaret.asp
Journal Impact Factor (2013): 5.8376 (Calculated by GISI)
www.jifactor.com

IJARET
©IAEME

A REVIEW ON CLOUD-BASED INTRUSION DETECTION SYSTEM FOR
ANDROID SMARTPHONES
1

Anirudha A. Kolpyakwar,

2

Sonal Honale,

3

Piyush M. Dhande,

4

Pallavi A. Chaudhari

1

Information Technology, Bapurao Deshmukh College of Engineering, Sevagram, Wardha,
Maharashtra, India
2
Computer Science Engineering, Abha Gaikwad Patil College of Engineering, Nagpur,
Maharashtra, India
3
Electronics & Telecommunication, Datta Meghe Institute of Engineering, Technology & Research,
Sawangi (Meghe), Wardha, Maharashtra, India
4
Information Technology, Bapurao Deshmukh College of Engineering, Sevagram, Wardha,
Maharashtra, India

ABSTRACT
Cloud computing is primarily being use for eliminating the need of local information
resources. The ability of cloud offers vast variety of services on web. As Smartphone usage has been
continuously increasing in recent years, but due to its complexity and functionality, they are also
susceptible to the attacks such as virus, Trojans and worms. The smart phones have inadequate
storage, processing and computational power to execute highly complex algorithms for intrusion
detection and implementing signature based attack detection. In this paper, different system
architecture for a cloud based intrusion detection and recovery system for Android smart mobile
phones are discussed. This architectures offers security against any misbehavior in network. The
high level architecture performs analysis on the virtualized and synchronized replica of an actual
device in the cloud environment. This analysis on the emulated device includes running multiple
detection engines in parallel, memory scanners and system call inconsistency detection that generate
responses in event of attack. The responses are instructs to mobile agent installed on the device to
take essential actions and perform recovery of device if needed.
Keywords: Android Smartphone, Cloud Computing, Intrusion Detection.

238
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME

INTRODUCTION
1.1

Cloud Computing
Cloud computing provides computation, storage, data access, security and software services
that do not require end-user knowledge of the physical location and configuration of the system that
brings the services [13]. Parallel to this, concept can be drawn with the electricity grid, where endusers consume power without needing to understand the component devices and infrastructure
required to provide the service. Cloud computing explains a new supplement, consumption and
delivery model for IT services based on internet protocols, and it usually involves provisioning
dynamically scalable and often virtualizes resources. It is a consequence of ease-of-access to remote
computing sites provided by the internet [13]. This may take form of web based tool or function that
user can access and use through web browser as if program were installed locally on their own
computers. A cloud computing provider delivers an application via internet, which are accessed from
the web browser, desktop or mobile applications, while business software and data stored on servers
at remote location. In some cases, legacy applications (line of business applications that until now
nave been prevalent in thin client Windows computing) are delivered via a screen-sharing technology
[13].
At foundation of cloud computing is broader concept of infrastructure convergence and shared
services. This type of data center environment allows enterprises or common user to get their
applications up and running faster, with easier manageability and less maintenance, and enables IT to
more rapidly adjust IT resources (such as server, storage and networking) to meet fluctuating and
unpredictable business demand. Most cloud computing infrastructure consists of services delivered
through shared data center and appearing as a single point of access for consumers computing needs.
Commercial offering may be required to meet service level agreements (SLA) [13].
1.2

Android Smartphone
Android smartphones are extremely popular fast growing communication devices in recent
years [13]. With the advent of internet, the mobile network infrastructure quality and affordability
consistently enhanced. As their data transmission become affordable and available, usage of smart
mobile phones for online financial transactions, mobile learning and web browsing become widely
popular among users which also cause several security issues [1], [13]. For Android based smart
phones, there are lot of third party application are available in free of cost on Google Play and various
other application store websites. Its easy availability of application encourages attackers to build
malicious applications for such devices. As architecture of such devices are much similar to classic
personal computers in terms of functionality as well as performance, common security threats like
worms, Trojans and viruses are also affecting smart phones [2], [13]. To protect from such threats
same security algorithms required that used to secure desktop PC. But these algorithms are highly
complex and resource consuming, it cannot be execute on such smart mobile phone devices as they
have power, computational and storage limitations. Another problem is inconsistency in software
support and security fixes by the manufacturer of Smartphone device. If bug fixes and patches are
does not provide by manufacturers to customers then security of Smartphone would be highly
compromised and make them vulnerable to attack. This is for example shown by the apparent version
fragmentation which can be observed in the Android environment [13]. The consistent updating of
software version and fixes makes devices more secure but it lacks in mobile devices. Using firewalls,
antivirus scanners, spyware scanners and root kit detectors on smart mobile devices is proves to be
difficult, mainly because of lack of resources like battery longevity, computing power and storage. To
overcome such limitations of smart mobile phone, Cloud Computing provides plenty of services,
software and processing power over an internet. In relation of mobile phones it reduces bandwidth
usage, power consumption (battery life) and processing power [3], [4], [13]. Cloud computing, and
239
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME

specifically Security as a Service (SECaaS), changes the dynamics of protecting smart phones over a
network [13]. Using such cloud services we can detect misbehavior in network and send back the
response signal which initiates recovery on the smart phone device [5], [13].
In Android smartphones recovery has to be done by putting a device in recovery mode. In the
recovery process any damage to mobile phone is recovered and device being restore. The recovery is
done by using mobile host agent which is nothing but the android application that been installed in
device. This application receives signal from cloud and manages traffic between internet and device
[13].
2.

AVAILABLE SECURITY MECHANISM IN ANDROID SMARTPHONES

In existing system of protection against malware attacks, Android smartphones are protected
by antivirus software (such as Avast, Kaspersky, McAfee) which consumes substantial battery power
of a device even in standby mode. In addition to this, antivirus software is based on signature based
detection which limits the detection range up to dataset available to that particular software. This
dataset set again need to update consistently which affects bandwidth efficiency. Many times such
software will not provide coverage to most recent signatures. In this paper, we are suggesting the
mechanism that uses the cloud environment and virtualization of mobile device as a mobile host agent
that protects device with conservation of vital resources battery, bandwidth and computational power
[13].
2.1

Mechanism of Mobile Host Agent
Same as an existing antivirus software, the mobile host agent is also a lightweight process that
runs on device and inspects the file activity. The only basic difference is that the mobile host is deals
with the cloud services and as mentioned earlier existing antivirus software is signature based having
very limited signature database size [6], [13]. The signature database size is keep varying in
accordance of different antivirus software but as mobile agent works in collusion with cloud
environment, it have advantage over antivirus software in terms of database size, as shown in
Table 1.
Table 1. The Number of Threats Addressed in the Signature Database of Various Detection
Engines
Detection Engine
Signature Database Size
Kaspersky Mobile
284 signature
Clam AV
262289 signature
Mobile Agent
> 5 million + behavior
The second major advantage of mobile host agent over antivirus software is ability to run
multiple detection engines in parallel. The existing antivirus software cannot run multiple detection
engines on a single device due to technical conflicts and resource constraints. The mobile host can use
cloud services and run multiple detection engine in parallel by hosting them on emulated device. The
use of virtualization to run multiple detection engines increases the coverage malware detection. This
also helps to scale a system to large number of users and engines. This allows analyze any single file
by various different detection engines [6], [13]. The increased detection coverage against a dataset of
malware samples when using multiple engines in parallel Clam AV (CM), Symantec (SM), McAfee
(MA), Bit-Defender (BD), and F-Secure (FS), the coverage also increases as illustrated in Table 2.

240
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME

Table 2. The Increased Coverage using Multiple Detection Engines in Parallel
Engine Combination
Detected
Coverage
CM
229/469
48.82%
CM, SM
290/469
61.83%
CM, SM, MA
358/469
76.33%
CM, SM, MA, BD
417/469
88.91%
CM, SM, MA, BD, FS
430/469
91.68%
2.2

A Mobile System Architecture with Cloud Proxy
The proxy server acts as a intermediary which mirrors the ongoing traffic between mobile
devices and internet then sends it to the cloud computing services where further in detail analysis has
been performed on the basis of behavior pattern and code signature [10]. Using various security
.
procedures provided by cloud computing services for Android Smartphone, cloud services ensures the
ures
Smartphone
security of device [10]. Using a proxy server permits us to take the advantages of cloud computing
which have almost unlimited computing power for analyzing the security of the mobile system. The
security
mobile security of the entire system depends basically on the security and trust level of the user, the
mobile device, the communication channel, and the backend, the cloud as shown in Figure 1. The
proxy, which is under company control, is used to collect as much security related information about
mpany
the precedent components as possible ( example by analyzing network traffic, querying company
(for
databases for organizational information et cetera). Additionally, the proxy requests information
reque
directly from the mobile device [10].
.

Fig. 1. Mobile System Architecture with Cloud Proxy
.
2.3

Synchronization Mechanism Using Proxy Server
Figure 2 depicts the synchronization mechanism using Record and Replay technique [9]. In
[9
this a computer program is by nature deterministic, but it receives nondeterministic inputs and events
that influence its execution flow. To replay a program, we need to record all these nondeterministic
inputs and events. Such inputs usually come from the underlying hardware (for example time comes
und
for
from the clock, network data from the Wi-Fi adaptor, location data from the GPS sensor, etc.), which
a process receives mostly through system calls to the kernel. Thus, to replay execution the tracer
records all data transferred from kernel to user space through system calls. There player then uses the
a
recorded values when replaying the system calls on the replica.

241
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME

Fig. 2. Synchronization using Proxy Server
3.

RELATED WORK

Paranoid Android which is an intrusion detection mechanism for Android based smart phones
was developed. This system was based on the cloud where intrusion detection used as a service [9].
This mechanism used to mirror the traffic between Smartphone device and internet using proxy server
and then analysis was done by replay and record method [9].
A very similar approach Response System for Mobile Phones exists in available Android
architecture [5]. In this architecture, to provide intrusion detection through cloud computing where a
lightweight mobile host was used to recover the device as well as achieve the input or files from the
device and send it to the network. There are many different intrusion detection techniques are used in
this system such as game theoretic intrusion and recovery engine that used to plot graph based on the
behavior of network or some particular entity [5]
The concept of virtualization [6] of devices over a cloud network that helps to emulate all the
scenario of security attacks without affecting device itself. Instead of cloud services this system used
network services to detection malicious activity. This mechanism used to make replica of actual
device on the server which is used in emulation process [6].
The static analysis of executable as well as the integration of a collaborative system for
detecting malware on Android based systems [11]. By inspecting files on the function call level and
comparing client cache data to already known malware files can be classified as harmful or harmless.
The analysis can either be performed locally on the device or offloaded to a remote detection server.
This leads to an improved detection rate [11].
Another approach, specifically targeted on the Symbian platform, is described [12]. It is
relying on behavioral analysis for detecting malware on mobile devices. The idea is based on the
assumption that a single action performed by an application can be classified as harmless, but in
relation to other actions, which are performed in the same context, malware behavior can be exposed.
Based on this assumption a database of behavioral signatures for malware was developed. By training
a support vector machine with normal behavior of applications, anomalies such as malware can be
detected [12].

242
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME

4.

HIGH LEVEL ARCHITECTURE FOR ANDROID SMART PHONE SECURITY

Fig. 3. System Architecture
The Android Smartphones are having limitations in computational resources such as
processing power, battery longevity and storage capacity which results in poor protection against
various security threats. These threats include zero day attacks, memory resident attacks, viruses,
Trojans and many other threats. To protect the Smartphone against these threats we need high level
intrusion detection algorithms, antivirus software and scanners. Due to limitations of resources
Android smartphones cannot protect themselves powerfully against these attacks. The existing
antivirus software provides signature based attack detection which again has limitation for signature
database size. To overcome such computational limitation the cloud services present in High Level
Architectures are very useful key. The cloud computing provides vast set of services which could be
access anywhere from the network. The cloud provides security services which could be used for
protecting the Smartphone device [13].
High Level architecture consists of a cloud computing services that receives input from the
gadget and performs intrusion detection to recognize malicious behavior or content over a network
and a lightweight mobile host agent installed on mobile device that performs recovery process in
event of failure [13]. High level system architecture is shown in Figure 3. It consists of two major
services cloud computing and mobile host agent. The function and sub functions of these two services
explained below.
4.1

Cloud Computing Services
The major component of this architecture is cloud computing services. In this architecture,
emulated device platform as a service and security as a service for intrusion detection and taking
proper action against it. Firstly, the target device is registered on the cloud server application that
monitors the traffic between device and internet and detects malicious behavior [13]. This application
set up following security methods.
243
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME

Emulator: Emulator is present in the cloud environment and having accurate copy of actual device. It
is used to perform runtime analysis on replica of device to detect definite types of zero-days attack
such as buffer-overflow and code injection attacks [7], [8], [13]
Memory Scanners: It scans the memory of a device that detects a memory resident attack. In such
kind of attack malicious components are concealed within memory, which leaves no file to detect for
antivirus software [13].
System call anomaly detection: Detection methods based solely on the system calls can even be
applied directly to the execution trace, without any need for replaying. As a result, system call
detection methods are extremely fast [13].
Antivirus Software: The various effective, efficient and popular open source antiviruses being used
to run in the emulator to detect various malicious scripts, signature and definition of viruses, worms,
and Trojans [13].
Mobile Host Agent
The mobile host agent is a lightweight process that installed in the form of application on the
Android device. It inspects file activity on the system and receives a signal from a cloud. It is also
provides the access control where each file is trapped and send to a handling routine which begins by
generating a unique identifier (such as a hash) of the file, which is compared against a cache of files
those are previously analyzed. If a file identifier is not present in the cache, then the file is sent to the
in-cloud network service for analysis [13].
After the analysis of file, the results are stored in both a local cache on the mobile host agent
and in a shared remote cache in the cloud computing service. Then the files can be accesses by mobile
device simply look up the result in the local cache without requiring network access. In addition,
access of the same file by other devices can be mediated using a shared remote cache located in the
cloud service, without having to send the file for analysis[13]. Cached reports stored in the network
service may also opportunistically be pushed to the agent to speed up future accesses. It is also
responsible for executing commands required to flash Android Smartphone device into recovery
mode [13].
4.2

5.

CONCLUSIONS

This paper explains various cloud based intrusion detection services that provides favorable
shield to Android Smartphone and mobile host provides optimal recovery procedure. It gives desired
configuration by installing several applications at one time. This eases the conformability with the
system even for technically unsound users. In this system, proxy server is responsible for duplicating
the communication between the Smartphone and the Internet and sending it to the emulator in cloud
environment where the intrusion detection and in-depth forensics analyses are performed.
The evaluation of a user space implementation of Paranoid Android architecture, shows that
transmission overhead can be kept well below 2.5 Kbps even during periods of high activity
(browsing, audio playback), and to virtually nothing during idle periods. Battery life is reduced by
about 30%, but it can be significantly improved by implementing the tracer within the kernel. It offers
more comprehensive security than possible with alternative models.
To address the growing concern of mobile device threats, Record and Replay approach can be
used in mobile device for malware detection. By moving the detection capabilities to a network
service, it increases the detection coverage, less complex mobile software, and reduced resource
consumption. This approach shows that it is feasible and effective for the current generation of mobile
devices, but will become even more consequential and valuable in the future as the scale and
sophistication of mobile threats increases.

244
International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 –
6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME

REFERENCES
1.

2.
3.

4.
5.
6.

7.
8.

9.

10.
11.

12.

13.

14.

15.

16.

17.

Stojan Kitanov, Danco Davcev “Mobile Cloud Computing Environment as a Support for
Mobile Learning”. In CLOUD COMPUTING : The Third International Conference on Cloud
Computing, GRIDs, and Virtualization ,2012, pages 99-105.
J. Jamaluddin, N. Zotou, and P. Coulton. “Mobile phone vulnerabilities: a new generation of
malware”. In Consumer Electronics, IEEE International Symposium, 2004, pages 199 – 202.
Thomas Ruebsamen, Christoph Reich, “Enhancing Mobile Device Security by Security Level
Integration in a Cloud Proxy”. In CLOUD COMPUTING : The Third International
Conference on Cloud Computing, GRIDs, and Virtualization, 2012, pages 159-168
Hamet Hamad, Mahmoud Al-Hoby, “Managing Intrusion Detection as a Service in Cloud
Networks”. In International Journal of Computer Applications, 2012, pages 35-40.
Amir Houmansadr, Saman A. Zonouz, and Robin Berthier, “A Cloud-based Intrusion
Detection and Response System for Mobile Phones”. In DSN-W, 2012, pages 31-32
Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian,
“Virtualized In-Cloud Security Services for Mobile Devices”. In Proceedings of the First
Workshop on Virtualization in Mobile Computing, 2008, pages 31–35.
Piromsopa, K.; Enbody, R.J. “Buffer Overflow Protection: The Theory”. In
Electro/information Technology, IEEE International Conference, 2006, pages 454-458.
Zhichun Li; Lanjia Wang; Yan Chen; Zhi Fu, “Network- based and Attack-resilient Length
Signature Generation for Zero-day Polymorphic Worms”. In Network Protocols, 2007, Pages
164 – 173.
Georgios Portokalidis Philip Homburg Kostas Anagnostakis, “Paranoid Android: Versatile
Protection for Smartphones”. In Proceedings of the 26th Annual Computer Security
Applications Conference, 2010, pages 347–356.
Yajin Zhou, Xuxian Jiang, “Dissecting Android Malware: Characterization and Evolution”.
In DSN Oakland, 2012
A.D. Schmidt, R. Bye, H.-G. Schmidt, J. Clausen, O. Kiraz, K. Yuksel, S. Camtepe, and S.
Albayrak, “Static analysis of executables for collaborative malware detection on android,” in
Communications, 2009. ICC ’09. IEEE International Conference on, june 2009, pages 1 –5.
Bose, X. Hu, K. G. Shin, and T. Park, “Behavioral detection of malware on mobile handsets,”
in Proceeding of the 6th international conference on Mobile systems, applications, and
services, ser. MobiSys ’08. New York, NY, USA:ACM, 2008, pages 225–238.
Rohit S. Khune and J. Thangakumar, “A Cloud-Based Intrusion Detection System for
Android Smartphones”, Proceedings of the International Conference on Radar,
Communication and Computing (ICRCC 2012), SKP Engineering College, Tiruvannamalai,
TN., India. 21 - 22 December, 2012. pp. 268-272.
Prof. P.L.Ramteke and Dr.D.N.Chaudhari, “Eclipse & Java Based Modeling Platforms for
Smart Phone”, International Journal of Computer Engineering & Technology (IJCET),
Volume 4, Issue 2, 2013, pp. 260 - 266, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Kirandeep and AnuGarg, “Implementing Security on Android Application”, International
Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013,
pp. 576 - 589, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Gurudatt Kulkarni, Jayant Gambhir and Amruta Dongare, “Security in CLOUD
COMPUTING”, International Journal of Computer Engineering & Technology (IJCET),
Volume 3, Issue 1, 2012, pp. 258 - 265, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
G.C.Priya, G.Gayathri and R.Parameswari,, “Monitoring System using Smart Phones”,
International Journal of Computer Engineering & Technology (IJCET), Volume 2, Issue 1,
2011, pp. 1 - 8, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
245

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET Journal
 
76 s201913
76 s20191376 s201913
76 s201913IJRAT
 
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET-  	  Enhance Smart Cities Security by Mitigating IoT VulnerabilitiesIRJET-  	  Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET- Enhance Smart Cities Security by Mitigating IoT VulnerabilitiesIRJET Journal
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd Iaetsd
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...IRJET Journal
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...IRJET Journal
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environmentsmlaij
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSHREYASSRINATH94
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderijaprr
 
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET Journal
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET Journal
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...BlackBerry
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET Journal
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...IAEME Publication
 
76 s201918
76 s20191876 s201918
76 s201918IJRAT
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISIJNSA Journal
 

Was ist angesagt? (20)

IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
76 s201913
76 s20191376 s201913
76 s201913
 
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET-  	  Enhance Smart Cities Security by Mitigating IoT VulnerabilitiesIRJET-  	  Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
 
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
 
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...IRJET -  	  A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud EnvironmentsA Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
 
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computingSecurity aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
 
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinderIjaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
 
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future InternetIRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future Internet
 
Citrix security booklet
Citrix security bookletCitrix security booklet
Citrix security booklet
 
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
 
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
 
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
 
489 493
489 493489 493
489 493
 
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
 
76 s201918
76 s20191876 s201918
76 s201918
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSISWEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
 

Ähnlich wie 20120130406025

Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationIAEME Publication
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIJIR JOURNALS IJIRUSA
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupEswar Publications
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationIJNSA Journal
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433IJRAT
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Publishing House
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...eSAT Journals
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingIAEME Publication
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingTahmin Aysha Murshed
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGIJNSA Journal
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms IJECEIAES
 
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...IOSR Journals
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challengesAlexander Decker
 

Ähnlich wie 20120130406025 (20)

Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
A017360104
A017360104A017360104
A017360104
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorizationSecure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
 
40120130405016
4012013040501640120130405016
40120130405016
 
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computingIjirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
 
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise SetupApplication Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
 
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computingA survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
 
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud ComputingSecurity and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTINGBIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
 
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
 
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
 
Mobile cloud computing implications and challenges
Mobile cloud computing  implications and challengesMobile cloud computing  implications and challenges
Mobile cloud computing implications and challenges
 

Mehr von IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Mehr von IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Kürzlich hochgeladen

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Kürzlich hochgeladen (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

20120130406025

  • 1. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 4, Issue 6, September – October 2013, pp. 238-245 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2013): 5.8376 (Calculated by GISI) www.jifactor.com IJARET ©IAEME A REVIEW ON CLOUD-BASED INTRUSION DETECTION SYSTEM FOR ANDROID SMARTPHONES 1 Anirudha A. Kolpyakwar, 2 Sonal Honale, 3 Piyush M. Dhande, 4 Pallavi A. Chaudhari 1 Information Technology, Bapurao Deshmukh College of Engineering, Sevagram, Wardha, Maharashtra, India 2 Computer Science Engineering, Abha Gaikwad Patil College of Engineering, Nagpur, Maharashtra, India 3 Electronics & Telecommunication, Datta Meghe Institute of Engineering, Technology & Research, Sawangi (Meghe), Wardha, Maharashtra, India 4 Information Technology, Bapurao Deshmukh College of Engineering, Sevagram, Wardha, Maharashtra, India ABSTRACT Cloud computing is primarily being use for eliminating the need of local information resources. The ability of cloud offers vast variety of services on web. As Smartphone usage has been continuously increasing in recent years, but due to its complexity and functionality, they are also susceptible to the attacks such as virus, Trojans and worms. The smart phones have inadequate storage, processing and computational power to execute highly complex algorithms for intrusion detection and implementing signature based attack detection. In this paper, different system architecture for a cloud based intrusion detection and recovery system for Android smart mobile phones are discussed. This architectures offers security against any misbehavior in network. The high level architecture performs analysis on the virtualized and synchronized replica of an actual device in the cloud environment. This analysis on the emulated device includes running multiple detection engines in parallel, memory scanners and system call inconsistency detection that generate responses in event of attack. The responses are instructs to mobile agent installed on the device to take essential actions and perform recovery of device if needed. Keywords: Android Smartphone, Cloud Computing, Intrusion Detection. 238
  • 2. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME INTRODUCTION 1.1 Cloud Computing Cloud computing provides computation, storage, data access, security and software services that do not require end-user knowledge of the physical location and configuration of the system that brings the services [13]. Parallel to this, concept can be drawn with the electricity grid, where endusers consume power without needing to understand the component devices and infrastructure required to provide the service. Cloud computing explains a new supplement, consumption and delivery model for IT services based on internet protocols, and it usually involves provisioning dynamically scalable and often virtualizes resources. It is a consequence of ease-of-access to remote computing sites provided by the internet [13]. This may take form of web based tool or function that user can access and use through web browser as if program were installed locally on their own computers. A cloud computing provider delivers an application via internet, which are accessed from the web browser, desktop or mobile applications, while business software and data stored on servers at remote location. In some cases, legacy applications (line of business applications that until now nave been prevalent in thin client Windows computing) are delivered via a screen-sharing technology [13]. At foundation of cloud computing is broader concept of infrastructure convergence and shared services. This type of data center environment allows enterprises or common user to get their applications up and running faster, with easier manageability and less maintenance, and enables IT to more rapidly adjust IT resources (such as server, storage and networking) to meet fluctuating and unpredictable business demand. Most cloud computing infrastructure consists of services delivered through shared data center and appearing as a single point of access for consumers computing needs. Commercial offering may be required to meet service level agreements (SLA) [13]. 1.2 Android Smartphone Android smartphones are extremely popular fast growing communication devices in recent years [13]. With the advent of internet, the mobile network infrastructure quality and affordability consistently enhanced. As their data transmission become affordable and available, usage of smart mobile phones for online financial transactions, mobile learning and web browsing become widely popular among users which also cause several security issues [1], [13]. For Android based smart phones, there are lot of third party application are available in free of cost on Google Play and various other application store websites. Its easy availability of application encourages attackers to build malicious applications for such devices. As architecture of such devices are much similar to classic personal computers in terms of functionality as well as performance, common security threats like worms, Trojans and viruses are also affecting smart phones [2], [13]. To protect from such threats same security algorithms required that used to secure desktop PC. But these algorithms are highly complex and resource consuming, it cannot be execute on such smart mobile phone devices as they have power, computational and storage limitations. Another problem is inconsistency in software support and security fixes by the manufacturer of Smartphone device. If bug fixes and patches are does not provide by manufacturers to customers then security of Smartphone would be highly compromised and make them vulnerable to attack. This is for example shown by the apparent version fragmentation which can be observed in the Android environment [13]. The consistent updating of software version and fixes makes devices more secure but it lacks in mobile devices. Using firewalls, antivirus scanners, spyware scanners and root kit detectors on smart mobile devices is proves to be difficult, mainly because of lack of resources like battery longevity, computing power and storage. To overcome such limitations of smart mobile phone, Cloud Computing provides plenty of services, software and processing power over an internet. In relation of mobile phones it reduces bandwidth usage, power consumption (battery life) and processing power [3], [4], [13]. Cloud computing, and 239
  • 3. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME specifically Security as a Service (SECaaS), changes the dynamics of protecting smart phones over a network [13]. Using such cloud services we can detect misbehavior in network and send back the response signal which initiates recovery on the smart phone device [5], [13]. In Android smartphones recovery has to be done by putting a device in recovery mode. In the recovery process any damage to mobile phone is recovered and device being restore. The recovery is done by using mobile host agent which is nothing but the android application that been installed in device. This application receives signal from cloud and manages traffic between internet and device [13]. 2. AVAILABLE SECURITY MECHANISM IN ANDROID SMARTPHONES In existing system of protection against malware attacks, Android smartphones are protected by antivirus software (such as Avast, Kaspersky, McAfee) which consumes substantial battery power of a device even in standby mode. In addition to this, antivirus software is based on signature based detection which limits the detection range up to dataset available to that particular software. This dataset set again need to update consistently which affects bandwidth efficiency. Many times such software will not provide coverage to most recent signatures. In this paper, we are suggesting the mechanism that uses the cloud environment and virtualization of mobile device as a mobile host agent that protects device with conservation of vital resources battery, bandwidth and computational power [13]. 2.1 Mechanism of Mobile Host Agent Same as an existing antivirus software, the mobile host agent is also a lightweight process that runs on device and inspects the file activity. The only basic difference is that the mobile host is deals with the cloud services and as mentioned earlier existing antivirus software is signature based having very limited signature database size [6], [13]. The signature database size is keep varying in accordance of different antivirus software but as mobile agent works in collusion with cloud environment, it have advantage over antivirus software in terms of database size, as shown in Table 1. Table 1. The Number of Threats Addressed in the Signature Database of Various Detection Engines Detection Engine Signature Database Size Kaspersky Mobile 284 signature Clam AV 262289 signature Mobile Agent > 5 million + behavior The second major advantage of mobile host agent over antivirus software is ability to run multiple detection engines in parallel. The existing antivirus software cannot run multiple detection engines on a single device due to technical conflicts and resource constraints. The mobile host can use cloud services and run multiple detection engine in parallel by hosting them on emulated device. The use of virtualization to run multiple detection engines increases the coverage malware detection. This also helps to scale a system to large number of users and engines. This allows analyze any single file by various different detection engines [6], [13]. The increased detection coverage against a dataset of malware samples when using multiple engines in parallel Clam AV (CM), Symantec (SM), McAfee (MA), Bit-Defender (BD), and F-Secure (FS), the coverage also increases as illustrated in Table 2. 240
  • 4. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME Table 2. The Increased Coverage using Multiple Detection Engines in Parallel Engine Combination Detected Coverage CM 229/469 48.82% CM, SM 290/469 61.83% CM, SM, MA 358/469 76.33% CM, SM, MA, BD 417/469 88.91% CM, SM, MA, BD, FS 430/469 91.68% 2.2 A Mobile System Architecture with Cloud Proxy The proxy server acts as a intermediary which mirrors the ongoing traffic between mobile devices and internet then sends it to the cloud computing services where further in detail analysis has been performed on the basis of behavior pattern and code signature [10]. Using various security . procedures provided by cloud computing services for Android Smartphone, cloud services ensures the ures Smartphone security of device [10]. Using a proxy server permits us to take the advantages of cloud computing which have almost unlimited computing power for analyzing the security of the mobile system. The security mobile security of the entire system depends basically on the security and trust level of the user, the mobile device, the communication channel, and the backend, the cloud as shown in Figure 1. The proxy, which is under company control, is used to collect as much security related information about mpany the precedent components as possible ( example by analyzing network traffic, querying company (for databases for organizational information et cetera). Additionally, the proxy requests information reque directly from the mobile device [10]. . Fig. 1. Mobile System Architecture with Cloud Proxy . 2.3 Synchronization Mechanism Using Proxy Server Figure 2 depicts the synchronization mechanism using Record and Replay technique [9]. In [9 this a computer program is by nature deterministic, but it receives nondeterministic inputs and events that influence its execution flow. To replay a program, we need to record all these nondeterministic inputs and events. Such inputs usually come from the underlying hardware (for example time comes und for from the clock, network data from the Wi-Fi adaptor, location data from the GPS sensor, etc.), which a process receives mostly through system calls to the kernel. Thus, to replay execution the tracer records all data transferred from kernel to user space through system calls. There player then uses the a recorded values when replaying the system calls on the replica. 241
  • 5. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME Fig. 2. Synchronization using Proxy Server 3. RELATED WORK Paranoid Android which is an intrusion detection mechanism for Android based smart phones was developed. This system was based on the cloud where intrusion detection used as a service [9]. This mechanism used to mirror the traffic between Smartphone device and internet using proxy server and then analysis was done by replay and record method [9]. A very similar approach Response System for Mobile Phones exists in available Android architecture [5]. In this architecture, to provide intrusion detection through cloud computing where a lightweight mobile host was used to recover the device as well as achieve the input or files from the device and send it to the network. There are many different intrusion detection techniques are used in this system such as game theoretic intrusion and recovery engine that used to plot graph based on the behavior of network or some particular entity [5] The concept of virtualization [6] of devices over a cloud network that helps to emulate all the scenario of security attacks without affecting device itself. Instead of cloud services this system used network services to detection malicious activity. This mechanism used to make replica of actual device on the server which is used in emulation process [6]. The static analysis of executable as well as the integration of a collaborative system for detecting malware on Android based systems [11]. By inspecting files on the function call level and comparing client cache data to already known malware files can be classified as harmful or harmless. The analysis can either be performed locally on the device or offloaded to a remote detection server. This leads to an improved detection rate [11]. Another approach, specifically targeted on the Symbian platform, is described [12]. It is relying on behavioral analysis for detecting malware on mobile devices. The idea is based on the assumption that a single action performed by an application can be classified as harmless, but in relation to other actions, which are performed in the same context, malware behavior can be exposed. Based on this assumption a database of behavioral signatures for malware was developed. By training a support vector machine with normal behavior of applications, anomalies such as malware can be detected [12]. 242
  • 6. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME 4. HIGH LEVEL ARCHITECTURE FOR ANDROID SMART PHONE SECURITY Fig. 3. System Architecture The Android Smartphones are having limitations in computational resources such as processing power, battery longevity and storage capacity which results in poor protection against various security threats. These threats include zero day attacks, memory resident attacks, viruses, Trojans and many other threats. To protect the Smartphone against these threats we need high level intrusion detection algorithms, antivirus software and scanners. Due to limitations of resources Android smartphones cannot protect themselves powerfully against these attacks. The existing antivirus software provides signature based attack detection which again has limitation for signature database size. To overcome such computational limitation the cloud services present in High Level Architectures are very useful key. The cloud computing provides vast set of services which could be access anywhere from the network. The cloud provides security services which could be used for protecting the Smartphone device [13]. High Level architecture consists of a cloud computing services that receives input from the gadget and performs intrusion detection to recognize malicious behavior or content over a network and a lightweight mobile host agent installed on mobile device that performs recovery process in event of failure [13]. High level system architecture is shown in Figure 3. It consists of two major services cloud computing and mobile host agent. The function and sub functions of these two services explained below. 4.1 Cloud Computing Services The major component of this architecture is cloud computing services. In this architecture, emulated device platform as a service and security as a service for intrusion detection and taking proper action against it. Firstly, the target device is registered on the cloud server application that monitors the traffic between device and internet and detects malicious behavior [13]. This application set up following security methods. 243
  • 7. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME Emulator: Emulator is present in the cloud environment and having accurate copy of actual device. It is used to perform runtime analysis on replica of device to detect definite types of zero-days attack such as buffer-overflow and code injection attacks [7], [8], [13] Memory Scanners: It scans the memory of a device that detects a memory resident attack. In such kind of attack malicious components are concealed within memory, which leaves no file to detect for antivirus software [13]. System call anomaly detection: Detection methods based solely on the system calls can even be applied directly to the execution trace, without any need for replaying. As a result, system call detection methods are extremely fast [13]. Antivirus Software: The various effective, efficient and popular open source antiviruses being used to run in the emulator to detect various malicious scripts, signature and definition of viruses, worms, and Trojans [13]. Mobile Host Agent The mobile host agent is a lightweight process that installed in the form of application on the Android device. It inspects file activity on the system and receives a signal from a cloud. It is also provides the access control where each file is trapped and send to a handling routine which begins by generating a unique identifier (such as a hash) of the file, which is compared against a cache of files those are previously analyzed. If a file identifier is not present in the cache, then the file is sent to the in-cloud network service for analysis [13]. After the analysis of file, the results are stored in both a local cache on the mobile host agent and in a shared remote cache in the cloud computing service. Then the files can be accesses by mobile device simply look up the result in the local cache without requiring network access. In addition, access of the same file by other devices can be mediated using a shared remote cache located in the cloud service, without having to send the file for analysis[13]. Cached reports stored in the network service may also opportunistically be pushed to the agent to speed up future accesses. It is also responsible for executing commands required to flash Android Smartphone device into recovery mode [13]. 4.2 5. CONCLUSIONS This paper explains various cloud based intrusion detection services that provides favorable shield to Android Smartphone and mobile host provides optimal recovery procedure. It gives desired configuration by installing several applications at one time. This eases the conformability with the system even for technically unsound users. In this system, proxy server is responsible for duplicating the communication between the Smartphone and the Internet and sending it to the emulator in cloud environment where the intrusion detection and in-depth forensics analyses are performed. The evaluation of a user space implementation of Paranoid Android architecture, shows that transmission overhead can be kept well below 2.5 Kbps even during periods of high activity (browsing, audio playback), and to virtually nothing during idle periods. Battery life is reduced by about 30%, but it can be significantly improved by implementing the tracer within the kernel. It offers more comprehensive security than possible with alternative models. To address the growing concern of mobile device threats, Record and Replay approach can be used in mobile device for malware detection. By moving the detection capabilities to a network service, it increases the detection coverage, less complex mobile software, and reduced resource consumption. This approach shows that it is feasible and effective for the current generation of mobile devices, but will become even more consequential and valuable in the future as the scale and sophistication of mobile threats increases. 244
  • 8. International Journal of Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME REFERENCES 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. Stojan Kitanov, Danco Davcev “Mobile Cloud Computing Environment as a Support for Mobile Learning”. In CLOUD COMPUTING : The Third International Conference on Cloud Computing, GRIDs, and Virtualization ,2012, pages 99-105. J. Jamaluddin, N. Zotou, and P. Coulton. “Mobile phone vulnerabilities: a new generation of malware”. In Consumer Electronics, IEEE International Symposium, 2004, pages 199 – 202. Thomas Ruebsamen, Christoph Reich, “Enhancing Mobile Device Security by Security Level Integration in a Cloud Proxy”. In CLOUD COMPUTING : The Third International Conference on Cloud Computing, GRIDs, and Virtualization, 2012, pages 159-168 Hamet Hamad, Mahmoud Al-Hoby, “Managing Intrusion Detection as a Service in Cloud Networks”. In International Journal of Computer Applications, 2012, pages 35-40. Amir Houmansadr, Saman A. Zonouz, and Robin Berthier, “A Cloud-based Intrusion Detection and Response System for Mobile Phones”. In DSN-W, 2012, pages 31-32 Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian, “Virtualized In-Cloud Security Services for Mobile Devices”. In Proceedings of the First Workshop on Virtualization in Mobile Computing, 2008, pages 31–35. Piromsopa, K.; Enbody, R.J. “Buffer Overflow Protection: The Theory”. In Electro/information Technology, IEEE International Conference, 2006, pages 454-458. Zhichun Li; Lanjia Wang; Yan Chen; Zhi Fu, “Network- based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms”. In Network Protocols, 2007, Pages 164 – 173. Georgios Portokalidis Philip Homburg Kostas Anagnostakis, “Paranoid Android: Versatile Protection for Smartphones”. In Proceedings of the 26th Annual Computer Security Applications Conference, 2010, pages 347–356. Yajin Zhou, Xuxian Jiang, “Dissecting Android Malware: Characterization and Evolution”. In DSN Oakland, 2012 A.D. Schmidt, R. Bye, H.-G. Schmidt, J. Clausen, O. Kiraz, K. Yuksel, S. Camtepe, and S. Albayrak, “Static analysis of executables for collaborative malware detection on android,” in Communications, 2009. ICC ’09. IEEE International Conference on, june 2009, pages 1 –5. Bose, X. Hu, K. G. Shin, and T. Park, “Behavioral detection of malware on mobile handsets,” in Proceeding of the 6th international conference on Mobile systems, applications, and services, ser. MobiSys ’08. New York, NY, USA:ACM, 2008, pages 225–238. Rohit S. Khune and J. Thangakumar, “A Cloud-Based Intrusion Detection System for Android Smartphones”, Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012), SKP Engineering College, Tiruvannamalai, TN., India. 21 - 22 December, 2012. pp. 268-272. Prof. P.L.Ramteke and Dr.D.N.Chaudhari, “Eclipse & Java Based Modeling Platforms for Smart Phone”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 260 - 266, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Kirandeep and AnuGarg, “Implementing Security on Android Application”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 576 - 589, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Gurudatt Kulkarni, Jayant Gambhir and Amruta Dongare, “Security in CLOUD COMPUTING”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 258 - 265, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. G.C.Priya, G.Gayathri and R.Parameswari,, “Monitoring System using Smart Phones”, International Journal of Computer Engineering & Technology (IJCET), Volume 2, Issue 1, 2011, pp. 1 - 8, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 245