The world of mobile devices keeps growing exponentially. Mobile devices, especially smartphones are easily accessible and with internet service they have become essential to people. The use of internet on mobile devices is called Internet of Things (IoT) services and they are monitored through the use of smartphone applications and services. There are thousands of applications or services that smartphones can do. For example, GPS, …show more content…
Malware then was designed to be inserted into the applications by the repackaging method. There are various techniques to detect malware in mobile devices: signature-based detections, behavior-based detection and taint analysis-based detection.
Signature-based detections use functions like packet-processing and pattern-matching to detect malware. Behavior-based compares recorded activities like SMS or Bluetooth with user’s average use to analyze intrusions. Analysis-technique carries out static taint analysis for Java source code to detect malware. (Sik Ham, Hee Kim, Sup Kim & Jung Cho, 2014).
According to the 2012 ASEC report, the most of the Android-targeted malware was Trojan, spyware, root permission acquisition and installer (dropper). Trojan is the largest …show more content…
230). Countermeasures should be implemented as part of the prevention method to ensure that the network and computers are secured as possible. Systems should be patched accordingly; access controls must be put in place to reduce potential infection to files. If prevention fails, then detection, identification and removal should be put in effect to successfully minimize denial-of-service costs. In addition, prevention mechanisms include anti-virus programs such as host-based scanners, generic decryption (GD) technology, host-based behavior-blocking software, spyware detection, rootkit countermeasures and intrusion prevention systems