期刊名称:International Journal of Innovative Research in Computer and Communication Engineering
印刷版ISSN:2320-9798
电子版ISSN:2320-9801
出版年度:2014
卷号:2
期号:10
出版社:S&S Publications
摘要:The smartphones are particularly vulnerable to viruses due to their versatile communication capabilitiesand intermittent network connectivity. As a result, the viruses can easily spread out and cripple both the smartphoneusers and the cellular and telephony infrastructures. Once malware enter to the system they start to find thevulnerabilities within the operating system then perform unintended operation in the system. Most of the malwaresbasically attack on performance of the system, data integrity and privacy. They also play the major role in denial ofservice attack. These malware are also capable to infect other executable files and data. Malwares depending on theirbehaviour collect the information about host and harm the host computer without consent of the owner. Generally acomputer virus causes damage to the host machine. The damage can be done to a number of different components ofthe computers operating and file system. These include system sectors, files, macros, companion files and source code.The always connected world of internet is a soft target for viruses. Viruses use internet connectivity to spread across theworld faster and create havoc. Smartphones have recently become increasingly popular because they provide all in oneconvenience by integrating traditional mobile phones with handheld computing devices. However, the exibility ofrunning third party softwares also leaves the smartphones open to malicious viruses. In fact, more than hundreds ofsmartphone viruses have emerged in the past few years, which can quickly spread through various means such asSMS/MMS, Bluetooth and traditional IP based applications. Therefore, protection of smartphone, user computer or anorganization computer network from viruses is very important task.