Font Size: a A A

Anylasis Of Mobile Virus And Research Of Countermeasures

Posted on:2005-11-21Degree:MasterType:Thesis
Country:ChinaCandidate:X L LiFull Text:PDF
GTID:2178360182967325Subject:Computer applications
Abstract/Summary:PDF Full Text Request
The function of the mobile phone is more and more abundant at present. It has already no longer confined to conversing. More functions have been planted into the mobile phone. From chatting to surfing in the Internet with mobile phone, various resources begin to pour into our mobile phone. During this period, the virus of the mobile phone arises at the historic moment too. With the arrival of 3G era, it is the one of the important functions of the mobile phone to be insertted into Internet and obtain a large number of information, and it increased the chance for the mobile phone to be infected with the virus too.But no matter the attention degree on the thought, or the dynamics of investment on the research fund, far lag behind the development with the virus of the mobile phone. Everybody seems to present a kind of attitude looked around to this. In order to take precautions against the virus of the mobile phone more effectively, the study on virus of the mobile phone has been already very urgent.Then enumerated the attack instances of several pieces of mobile phone virus, and carry concrete analysis on three kinds of typical mobile phone virus among them, including influence, realizing mechanism and deleting the method,etc. Because mobile phone infect with the virus through short news and a Java applet download from Internet, so we have analysed to the security risks of the business system of short news and a Java applet, and put forward the corresponding countermeasure. According to the similarity of the propagate mechanism of the mobile phone virus and computer virus, and the resemblance between network of mobile phone and computer network, we have proposed the spread model of the network virus of the mobile phone in the future on the basis of analysing the original virus and propagating defect of models. And compare the number value of this kind of model with spread data of the network virus of the realistic computer. The result indicates that our model can reflect the actual conditions even more. We compare installing the personal firewall in the mobile phone by way of software to installing personal firewall among GGSN, and analyse their disadvantages and advantages, thus draw the conclusion that it is better to install the personal firewall in two places.
Keywords/Search Tags:The virus of the mobile-phone, Virus mechanism, the virus model, personal firewall
PDF Full Text Request
Related items