Essay On Malware Protection

997 Words2 Pages

5. Malware Protection/PreventionTechniques
Prevention by Platform Diversity
One of the main insights into the presence of malware is provided by the pattern of the battery consumption by the application or the software that is suspected of being a malware. The key to identifying misbehaving application using the battery power consumption is to determine the battery consumption pattern of a normal application. The techniques used to detect power consumption statistics in real time are relatively low cost. The works by Jacoby et.al have identified techniques such that a greedy malware would always do certain malicious activity like scanning, or sending SMS which would be identified in their power consumption behavior.

Figure 11: Bridged Mode for execution
The idea of maintaining platform-diversity could be an effective solution to reducing the number of malwares. A single malware would be rendered ineffective when there is a completely different interface connecting any two mobile devices. Yan et.al suggests using a two layer protection mechanism to counter mobile malware. One of the layers is encountered is while installing the app. The user is asked to shift to a bridged mode while installing the app and a different execution environment while developing a particular application. The challenges faced while using this approach is correctly map the execution environment to the development. The bridged phase should be as short as possible.

Figure 12: Sandbox Approach

Figure 13: Power Consumption

Sandboxing the app allows for removing certain privileges to be temporarily revoked. Thus sandboxing can provide effective malware protection in some cases. A hardware sandbox is further helpful in protection key hardware re...

... middle of paper ...

...art deals with maintaining a list of rules that would detect any suspicious behavior of the app by maintaining known signatures. The second part would include a utility such as snort provided as open source with Ubuntu 12.04 release that can monitor the network interfaces. The rules created earlier also contain known safe signatures to avoid false positives.
The VPN tunnel captures the traffic that flows between the smartphone and the Internet. The following Http requests are flagged against the signature rules that are applied.

The VPN tunnel captures the traffic that flows between the smartphone and the Internet. The following Http requests are flagged against the signature rules that are applied.

Malware Detected: TrojanFakeLookout

Malware Detected :AndroidFakelash - Android SMS trojan

Malware Detected:AndroidFakelash - Android SMS Trojan

More about Essay On Malware Protection

Open Document