An Improved the Optimal Distributed Dummy Signature for Malicious Software in Mobile Network
Author(s) -
Ashvini Bhatkal,
Rajesh Phursule
Publication year - 2015
Publication title -
international journal of computer applications
Language(s) - English
Resource type - Journals
ISSN - 0975-8887
DOI - 10.5120/ijca2015905717
Subject(s) - computer science , signature (topology) , software , computer security , computer network , operating system , mathematics , geometry
Now a day the world is mobile and internet oriented, each and every person must have the both of things. While in using the mobile and internet we have to face many problems such as malware attacks in while in sending and receiving message. We consider a malware attack in sending an MMS and Bluetooth. We found many problems while sending message we used distributed algorithm and dummy signature to protect the message from malware [3].In mobile network malware attacks frequently occur while sending and receiving information [2]. Develop an efficient system to protect infection and infected nodes to recover and produce dummy signature to overcome of spreading and outbreaks of malware [1]. We found that the problem is how to optimally distribute contentbased signature of malware, that help to detect malware and disable further propagation to minimize the no of infected nodes[4]. we can go through two different approaches 1. MMS 2. Bluetooth. In MMS a malware send a copy of itself to all devices whose numbers are found in address book of infected device. We use optimal distributed solution to efficiently avoid malware spreading and apply dummy signature to help infected nodes to recover [1].
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom