International Journal of Advanced Research in Computer Science and Software Engineering
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Special Issue on 2nd International Conference on Electronics & Computing Technologies-2015 Conference Held at K.C. College of Engineering & Management Studies & Research, Maharashtra, India Smartphone Security: Review of Attacks, Detection and Prevention Poornima Mahesh, Ashwini Jayawant, Geetanjali Kale K.C.C.E.M.S.R. Thane, Maharashtra, India Abstract— In recent years Smartphone has become the most typical and popular mobile device. It acts as portable computer and functions similar to the processing unit, communication unit, data storage unit of any ordinary PC. It also provides many computers’ service, such as web browser, portable media player, video call, GPS, Wi-Fi and many other applications. Due to inadequate access control policies and lack of information on securing mobile devices it is necessary to study the challenges of provisioning and managing security in mobile phone environments. However, the security of mobile communication has topped the list of concerns for mobile phone users. Confidentiality, Authentication, Integrity and Non-repudiation are required security services for mobile communication. This paper highlights various aspects of security that require extra focus when enabling mobile. This paper reviews various security issues of Smart phones. Keywords—Smartphone, Security, Mobile communication, Authentication I. INTRODUCTION Security is required to avoid illegal access to the user‟s private information and data. It is required to ensure that whether people in the social network provide their real information or not. To address these issues, a lot of methods, such as strong authentication, account control and protecting application layer attacks, should be added into this kind of applications. The providers of Smartphone‟s applications should take more responsibility to protect their users from these attacks. Secondly, when social network application becomes more and more popular, the importance of security and trust attracts more attention. Smartphone are increasingly becoming a target of security threats. Because, the number of attacker performing browser attack is increasing recent year, whose targets are many different kinds of smart phone‟s applications. There is one kind of Trojan that can infect users' web searching engine and modify web pages or transactions. Some approaches can be used to protect users from this kind of attack, such as transaction validation, site to client authentication, security code evolution etc. Users own mobile device can be used to increase productivity of an organisation Users can access corporate resources from their own mobile devices. [10] However, introducing mobile devices in the enterprise presents additional security challenges. Android devices may even serve as remote bases for attacks on other GSM subscribers, though this is regarded highly improbable. Several new and well-known threat scenarios apply for Android smart phones. These include easily conductible money fraud, industrial espionage, corporate or military network infiltration and even denial of service attacks on today‟s already heavily loaded mobile networks. II. SECURITY ISSUES FACED BY ANDROID Android mobile phones have various security issues, which are given below: 1. ANDROID has no specific control is applied to applications submitted by developers. There is no security scan in Android over the applications being uploaded. User can work as admin [11] install application, download data, access unprotected networks there is no restriction in Android domain. Android is a modern mobile platform which is designed to be truly open source. Therefore it is available to legitimate developers as well as hackers too. So for developing critical systems the Android framework cannot be trusted. 2. PC and any Android device can be connected by using USB cable, laying out the contents of its SD card for read/write/delete. These methods could be utilised themselves for bringing malware in to a corporate network, for downloading malicious content on to a PC as soon as it is connected. Android Beam (Android 4.0), an NFC (Near Field Communication) based file and data transmission system with a range of approximately 10 cm. Android Beam is of limited utility, as it requires user interaction for installation. For example, a web link to a malicious app can be sent to another Android4 device via Android Beam, but the user still has to click the link and confirm it. The limited physical distance reduces malware infection risks even further. As USB host mode has only recently become available, device-to-device propagation has not yet been reported. However, Android 4 comes shipped with a db server which allows remote access via shell on other connected Android devices. As a result, malware can use the pre supplied a db program to install apps on other devices. Any difficulties in implementing the db protocol are thus eliminated. Facilities for device-to-device infections are provided by the Android operating system. © 2015, IJARCSSE All Rights Reserved Page | 141
Mahesh et al., International Journal of Advanced Research in Computer Science and Software Engineering 5 (3), March- 2015, pp. 141-145 3. There are some apps which can exploit the services of another app without permission request [8]. Any app on the android platform will access device data just like the GSM and SIM marketer Ids without the permission of the user. 4. Infection via Rogue Wireless Networks the monthly amount of data which can be transmitted in current plans is very limited therefore users are attracted towards open wireless access points .The various options to manipulate data traffic sent from or to a user‟s handheld device are download and installation requests for apps distributed by single websites instead of the official vendor app market can be easily redirected to malicious APK files. Even legitimate apps may be replaced during transmission. Alternatively, users logging into the rogue wireless network may be presented with a fake website displaying a critical update to an app installed on nearly all devices such as Google Search. App Developer Uploads Legitimate App Android Market Legitimate App Downloads Malware Author Repackages legitimate apps with malware Trojaned Passwords App Bank Account details Distributed Documents pirated apps Contact Details …. Android Websites 3rd Party Market App store User downloads pirated apps; get infected User Trojaned apps transmits data to malware author Fig.1Repackaging process[9] The majority of all infections are conducted through free illegitimate copies of paid content. Users unwilling to pay for such content turn to pirated copies, which are often altered to deliver malicious code. This process, known as “repackaging”,is illustrated in Figure 1. III. TYPES OF ATTACKS [1] They are classified as: 1. Malware 2. Grayware 3. Spyware Malware Mobile Threats Model Spyware Grayware Fig2 .Mobile threat model[12] © 2015, IJARCSSE All Rights Reserved Page | 142
Mahesh et al., International Journal of Advanced Research in Computer Science and Software Engineering 5 (3), March- 2015, pp. 141-145 1. Malware: It can be defined as malicious software which accesses mobile phones confidential information and can result in collapse of device. Malwares can be classified as: a. SMS attacks: In this type, attacker can send phishing links and acquire some sensitive information such as credit/debit card number and password. b. Bluetooth attacks: In this type of attack, user‟s mobile location can be tracked as well as conversation can be listened by attacker by using special type of software. Attacker can also access user‟s contact details and messages. c. Premium rate attacks: With this type of attack, attacker can send premium rate SMSs and can make calls to premium rated number without user‟s consent. d. Phone jail-breaking: In this type of attack, attacker sends some attractive messages to install certain applications which can be harmful for the mobile phone. 2. Grayware: Though it does not cause any damage to mobile device, but it uses certain applications to access data from mobile phone for marketing purpose. 3. Spyware: A spyware is a malicious application that pretends to be something it is not or actively hides itself from the user while collecting bits of information about the user without the user‟s knowledge or consent. It is a spy software which hides in an application or software. It monitors victim's activities after installed and sends activity report to the attacker In this type, user‟s personal information like call list, location, contact list can be accessed by attacker and he can physically access the device without user‟s consent. 4. Rooting: Rooting means to grant the user full administrative access to their smart phone. This includes installation of apps in conflict with the android security architecture. Some users may wish to install modified operating systems on their devices, which is also only possible with privileged access. This usage model is not driven by a third party‟s malicious intent. However, rooting one‟s smart phone may introduce higher risks of successful malware infection. Some modified operating systems are less well maintained than pre installed ones. They also often provide facilities for any installed software to easily gain root privileges. Thus, rooting a smart phone may pose a high security risk. IV. DETECTION In mobile environment, the detection techniques should be energy efficient because of the very nature of limited device resource. Smart phone malware detection techniques are categorized in two types A. Host-based: The technique that runs in mobile phone is termed as host-based technique. Most mobile-specific versions of antivirus software that is currently available offered by security vendors implement similar techniques used by their desktop variants. There are three types of of Static analysis methods a) System call based analysis b) Static taint analysis c) Source code analysis In these analysis methods code or application is analyzed without executing the program. Static analysis is a fast and simple approach. These methods are explained in figure 3.[14] Start Android application Decompile Android source code Semantic Analysis Abstract syntax tree Data Flow Analysis Android source code End Fig. 3 : Flow of Static Analysis Another method suggested by various papers is dynamic analysis. This method dynamically monitors the behavior of mobile application in an isolated environment hence termed as dynamic or behavioral analysis. © 2015, IJARCSSE All Rights Reserved Page | 143
Mahesh et al., International Journal of Advanced Research in Computer Science and Software Engineering 5 (3), March- 2015, pp. 141-145 B. Cloud-based: In this technique the intense computation is offloaded to a separate server to improve the efficiency, of s smart phone. Mobile devices have less resource and having a full-fledged detection system in a mobile device would be a resource overhead.A cloud based approach can be used efficiently to reduce. In this scheme a light-weight client application monitors the system calls in the device and sends it to the server in cloud to detect malicious behaviour. Thus, offloading of powerful computation to the cloud will enable efficient detection for heterogeneous devices. In this method, there are two components, first components checks the file in local cache and second component analyses it. Host agent runs in mobile device that sends the files to a server. Access to each file is captured and the file is checked in a local cache for availability or modification. In case the file is changed or a new file, then it is sent to the server. The server can have multiple antivirus engines with more sophistication which cannot be done in a mobile phone. The detection could use either Static analysis or Dynamic analysis or both. The server could have an emulator to replay the access to check for any malicious activity. The centralized server could maintain black- listed malware and check for similar pattern in the new files. [13] Mobile File Monitor 1 Cloud Detection Server Mobile File Monitor 2 Emulator Fig. 4 Cloud Detection System There are many operating systems available for the smart phones; one of this is The Android operating system. Android is an open source and free mobile operating system based on the Linux kernel and developed by the free software community, Google, Open Handset Alliance. It is a modern mobile platform which is designed to be truly open source. The Android applications can uses advanced level of both hardware and software as well as local and server data, through this platform developer bring innovation and value to consumers. The open nature of Android and its large user base have made it an attractive and profitable platform to attack. Common exploits and tool kits on the OS can be utilised across a wide number of devices, meaning that attackers can perform exploits and re-use attack vectors. To ensure security of user data,, application and network Android platform must have security mechanism [1]. The developer develops an application and uploads it to Android market which is a paid legitimate application. The attacker downloads the application then the attacker analyses the code obtained by reverse-engineering, inserts malicious code, and then recompiles it to create a forged DEX file with which he/she can repackage and self-sign the app with his/her private key and the distribute the forged app. Most of the smart phone users are attracted towards such free versions rather than paid legitimate applications. So such infected applications are downloaded and becoming popular. V. METHODS TO PREVENT ATTACKS ON ANDROID SMART PHONES Ways to prevent Android Malware attacks: a. Download apps from authorized or legitimate apps stores. If you want to better understand how your smart phone‟s content is being accessed, check out the application permissions when you download an app from Google Play. Once you hit the „Install‟ button but before you „accept & download‟, you‟ll be presented with a list of permissions grouped by categories such as „Storage‟, „System tools‟, „Network communication‟ and „Your location.‟ If you're not comfortable sharing the information, don't install the app. b. Switch off 'Unknown sources' Depending on which version of Android your device runs, you‟ll have the option to allow or disallow „Unknown sources‟ of non-market applications. Clicking allow enables you to find app files such as .APKs from elsewhere on the internet to endow your Android phone with applications unavailable through official c. Choose the best antivirus app for your phone. There are a decent array of mobile security apps like McAfee Antivirus & Security, Norton Antivirus & Security, Lookout Security & Antivirus d. Use authentication such as Passwords to protect your phone. e. Don‟t view or share sensitive personal information in the public Wi-Fi. f. Read and understand the permissions before you download any new app. g. Make sure you download apps that are scanned through Bouncer (internal malware scanner in android market) There are some strategies that we‟d like tom point out for hardening smart -phone which we discuss as follows: • Attack surface reduction: Desktop PCs and mobile devices both have similar hardware and software running inside. Hence, security for computers and smart phones has a lot of common characteristics but this mechanism may be more effective for smart-phones than PC because the smart-phone usage model is different from that of PCs.[12] Although smart-phone is always on, most of its features need not be active. For example, when users make an outgoing phone call or compose a SMS message, the PC part of the smart phones can be turned off. © 2015, IJARCSSE All Rights Reserved Page | 144
Mahesh et al., International Journal of Advanced Research in Computer Science and Software Engineering 5 (3), March- 2015, pp. 141-145 Hardware hardening: The SIM card of smart phone has evolved to incorporate the use of the SIM Toolkit (STK) — an API for securely loading applications to the SIM. STK allows the mobile operator to create or provision services by loading them into the SIM card without changing anything in the GSM handset. One interesting approach therefore is to combine STK card and TCG‟s Trusted Platform Module (TPM) for smart-phone hardware hardening. This way no additional security chips will be needed.[7] VI. CONCLUSION Nowadays, mobile phones are not only restricted to voice services but also used for browsing internet, playing games, sending multimedia messages, mobile banking. Many industry professional are using their sophisticated mobile devices which helps to improve their productivity but confidential data of their enterprise moves outside of the secure perimeter of the enterprise. Therefore new security threats are emerging. As pointed out by recent research and publications, attacks on Android powered devices are becoming more sophisticated. They are now capable of spreading mechanisms which do not require explicit user confirmation. Malware may be delivered unnoticed through desktop computers, other Android devices or trojanized apps. Malicious apps cannot be avoided completely. Especially pirated apps or multimedia content in popular demand targeting user groups with typically low awareness levels are predestined to spread to many devices before being identified by Google as malware. REFERENCES [1] “REVIEW ON MOBILE THREATS AND DETECTION TECHNIQUES”, Lovi Dua and Divya Bansal Computer Science Department, PEC University of Technology, Sector 12, Chandigarh 160012, India. IJDPS Vol.5, No.4, July 2014. [2] “Comprehensive Security System for Mobile Network Using Elliptic Curve Cryptography over GF (p)” Lokesh Giripunje Sonali Nimbhorkarv Nagpur, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 5, May 2013. [3] Extending Enterprise Access and Governance with Oracle Mobile Security , March 2014. [4] “Users Perceptions of Mobile Phone Security: A Survey Study in the Kingdom of Saudi Arabia” Thamer Alhussain, Rayed AlGhamdi, Salem Alkhalaf, and Osama International Journal of Computer Theory and Engineering, Vol. 5, No. 5, October 2013 [5] “A Research on Software Security Vulnerabilities of New Generation Smart Mobile Phones” N. Yıldırım, R. Daş and A. Varol. ISDFS‟14), 12-13 May 2014, Houston, TX [6] “A stochastic model of TCP Reno congestion avoidance and control,” J. Padhye, V. Firoiu, and D. Towsley, Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999. [7] “Smart-Phone Attacks and Defenses”, Chuanxiong Guo xguo Microsoft Research Helen J. Wang helenw MicrosoftResearchWenwuZhu [8] “Review of Malware Defense in Mobile Network using Dynamic Analysis of Android Application”, Miss. Ashwini A. Dongre, Dept. Of Computer Science and engineering P.R.Patil College of engineeringAmravati, Prof.C.J.ShelkeDept.ofComputerScience and engineering, P.R.PatilCollegeofengineeringAmravati,India [9] Android OS Security: Risks and Limitations Rafael Fedler, Christian Banse,ChristophKrauß,andVolkerFusenig [10] Good Technology Mobility Index Report Highlights Enterprise Mobility Shift from Devices to Applications, Aug 12, 2014 | Sunnyvale, CA [11] “A Brief Guide to Android Security” /Ryan Farmer www.acumin.co.uk/download_files/.../android_white_paper_2.pdf [12] “Mobile Malware Evolution, Detection and Defense” Srikanth Ramu,The Institute for Computing, Information and Cognitive Systems (ICICS),University of BritishColumbiaVancouver,BCV6T1Z4 Canada [13] “Virtualized in-cloud security services for mobile devices”, Jon Oberheide , Kaushik Veeraraghavan , Evan Cooke , Jason Flinn , Farnam Jahanian, , Proceedings of the First Workshop on Virtualization in Mobile Computing, June 17-17, 2008, Breckenridge, Colorado [14] “Runime-based Behavior Dynamic Analysis System for Android Malware Detection” ,Luoxu Min,Qinghua Cao,Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012) © 2015, IJARCSSE All Rights Reserved Page | 145
You can also read