Anti-Hijack: Real-Time Detection and Prevention of Attack on Android

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 04 | Apr -2017

www.irjet.net

e-ISSN: 2395 -0056 p-ISSN: 2395-0072

Anti-Hijack: Real-Time Detection and Prevention of Attack on Android 1LOKESH

KUMAR MISHRA, 2RAHUL DEVKAR, 3TUSHAR DESALE, 4RAHUL BIDKAR, 5

123456Dept.

JAYANT WAGHALE, 6PROF. S.R. BHAMARE

of Computer Engineering, NDMVP’s Karmaveer Baburao Thakare College of Engineering, Nashik, Maharashtra, India

------------------------------------------------------------------------------------------------------------------------------------Abstract—Examining the latest studies, Android have

not only operating system but also middleware and key

achieved the highest market value share in Smartphones.

applications. People are contracting with the growth of

The Android applications are increasing numerously. Hence

mobile technology. As the number of users is increasing,

threats and attacks on Android technology are also rising.

also facilities are increasing. With old regular handsets

There are many applications which bypass user by hiding

which were used just for phone calls, mobiles have

their functionalities and send user private and important

changed life and have become member of it. Now they are

information and data across the network. . In this paper, we

not used just for making calls but they have innumerable

are summarizing detection of two fatal malware attacks i.e.

uses and can be used as a Camera, Music player, T.V., Web-

intent based hijacking and authenticated session based

browser etc. and with the new technologies, new software

hijacking. We are using the honey-pot concept for detection

and operating systems are required. Specifically from

of these two authentication hijacking attacks. To achieve

some malware samples, we find that some of them are

this, we have tested various apps and their cooperation with

repackaged versions of legitimate applications with malign

the honey-pot maintained by android device i.e. smartphone

payloads, which indicates the policing need of detecting

or an emulator. We have designed benevolent app as a

repackaged applications in the current Android Markets.

honey framed app. We quibble that hijacking malware

II. PROBLEM STATEMENT

would be detected with higher accuracy using our

This application is useful for the users to provide security to

methodology at real-time by comparing the traditional

the mobile phones. In current time, there has been many cases

machine learning strategies. Our detection method Anti-

where personal and confidential information of a user can be

Hijack is a helping hand in this platform which provides

accessed by many other hijackers. This usually happens when

light weight, device operated real-time detection at

we install a new application to our system and then all our

hijacking malware.

personal data can be seen by others. Also, while doing

Key words— Vulnerabilities, Smartphone, Security,

banking transactions, we have experienced many cases where

Honey-net, Spoofing Attack, Anti-spoofing, Android,

confidential data is shared to an unknown person (hijacker).

Permissions.

For this, we have proposed a new version of security system, whether it checks the downloaded application or redirected

I. INTRODUCTION

URL is safe to access or not.

One of the most widely used mobile OS these days

Thinking on the drawbacks and inadequacies of existing

is ANDROID. Android is a bunch of software comprising

process, there is a great need of an efficient system. The

© 2017, IRJET

|

Impact Factor value: 5.181

|

ISO 9001:2008 Certified Journal

|

Page 3389


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.