Normal virus were computer programs with static structure showing very limited functionality. Once detected for the first time, the antivirus use their structure for detecting the similar viruses with similar patterns. However, modern viruses are much developed and self-configured. They frequently c
Mobile Virus Detection
Normal virus were computer programs with static structure showing very limited functionality. Once detected for the first time, the antivirus use their structure for detecting the similar viruses with similar patterns. However, modern viruses are much developed and self-configured. They frequently changes attack states or uses different file names, hashes or signatures to encrypt or otherwise hide its code so as to avoid detection and eradication.
Polymorphism is used to evade pattern-matching detection relied on by security solutions like antivirus software. While certain characteristics of polymorphic malware change, its functional purpose remains the same. For example, a polymorphic virus will continue to spread and infect devices even if its signature changes to avoid detection. By changing characteristics to generate a new signature, signature-based detection solutions will not recognize the file as malicious. Even if the new signature is identified and added to antivirus solutions’ signature database, polymorphic malware can continue to change signatures and carry out attacks without being detected.
Because polymorphic malware is engineered to evade detection by traditional antivirus tools, the best solutions for this threat use advanced, behavior-based detection techniques. Behavior-based detection solutions like endpoint detection and response or advanced threat protection can pinpoint threats in real time, before any of your data is compromised. Behavior-based malware protection is more accurate than traditional signature-based methods which struggle to deal with polymorphic attacks.
In this project we will conduct study on polymorphic viruses, how they change their form and escape through the signature based detection systems. We will develop polymorphic virus and we will check how they are affecting different mobile phones with different operating systems. After complete analysis of polymorphic virus and checking the loop hole in operating system, we will make an antivirus to detect and protect mobile phones from polymorphic virus.
People might create viruses for the purpose of making money, reselling information, playing with a company’s systems or networks, or simply proving that it can be done. The source of an attack is an insider, a hacker or a terrorist, the consequences are often the same – loss of revenue, sensitive information, erosion of consumer and constituent confidence and interruption or denial of business operations.
The main objective of this project is to develop an antivirus for mobile phones which will detect not only traditional viruses but also the modern viruses especially the polymorphic viruses. This will help to improve security of mobile phones and protect them from being compromised.
In this project we will make a software that will detect the viruses. We will use the combined concept of signature byte code detection, pattern matching and behavior based detection technique to detect the presence of any malware in the android device and helps getting rid of it so that the user can make the optimum use of the device. For this we will first make a viruses and check their effect on different mobile phone operating systems. After complete analysis of polymorphic virus and checking the loop hole in operating system, we will make an antivirus to detect and protect mobile phones from polymorphic virus.
Explosive growth in the mobile market of smartphones, personal digital assistants (PDA), and similar integrated devices like an iPhone has become evident since the turn of the century.
Concurrent with this emergent growth in the mobile media market is the development of mature cyber-criminal fraud operations and the spread of the first mobile malware (MM) in the wild. Data is the most crucial and essential component of every organization, and no one would want to risk the confidential data to the viruses approaching the mobile phones.
This project will help user to keep their mobile phones secure from any unauthorized source approaching their phones from the internet, external drives, CD/DVDs, etc. and keeps your confidential data secured.
The technical details for the creating this project is following:
A software that will detect the viruses
Software will work on signature byte code detection, pattern matching and behavior based detection to detect the presence of any malware in the android device and helps getting rid of it so that the user can make the optimum use of the device.
It will scan various files and checks them against a viral code to detect any signs of a virus or malware
| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| nokia 2.1 | Equipment | 1 | 14422 | 14422 |
| Samsung galaxy j4 core | Equipment | 1 | 17399 | 17399 |
| Total in (Rs) | 31821 |
The gathering of energy data and to select the right energy KPI becomes very problematic b...
To develop an Autonomous Robotic Arm that can remove defective items off the conveyor belt...
Our project is Blind navigation system. Our aim is to provide facility for visually i...
Online Blood Donation website is related to blood donation and Acquisition. This project a...
With th...