Font Size: a A A

Analysis On Trojan Attack And Defend Mechanism For Smart Phone Based On Android System

Posted on:2014-01-17Degree:MasterType:Thesis
Country:ChinaCandidate:Y L WangFull Text:PDF
GTID:2248330398957409Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the wide application and popularity of mobile phone which carrying the Android system, for the safety research of the system will become the new hot spot. As the design of Android system takes full advantage of the previous operating system in the beginning, make it has a good safety characteristics. But this does not mean that the Android system is not existence of security risks, on the contrary, with Android mobile phone market share and its good growth momentum, the attack will be more and more, therefore, the research and analysis of Android system based on the mode of attack and anti virus software will be great significance.Trojan horse is a kind of malicious programs which attached to the application or independent existence, mainly adopts the client/service mode, the server program running on the control computer, the remote client complete control function. The client using remote control technology to realize Trojan infected host control, produce operation or theft the confidential documents malicious.Android system learn security mechanisms from previous operating system, and it has done many design for levels of the entire system architecture targeted to strengthen security, so that the security of the system can be much increase, which package including traditional linux security mechanisms, Dalvik virtual machine security mechanism, as well as Android-specific security mechanisms. But the most important safety mechanisms in the system:Permission mechanism exist obvious deficiencies at management of application permissions.When user install any applications, the user can not freely according to their own needs customized or select applications access permissions. All or nothing way of authorization, even if the user see authorization interface, in order to complete the installation will also be granted to allow all permissions. Furthermore, after the installation is complete, the license granted permissions will not change, the method of user to delete permissions is only to uninstall the application. In addition, now all the app application on the market, almost every application would apply for network access permissions, which makes users hard to judge the application will use this authority to do. Therefore, once granted this permission can make an application to the user privacy data is sent to the third party, not only lead to privacy data leakage, but also may cause the network traffic cost extra.Considering the defects to the security of Android’s existence, learn fROMthe PC machine to the protect system, running a real-time firewall to protect system is a reasonable choice.The firewall technology is a mature technology of network security, play a important role in the modern Internet security, after years of development, has evolved into a comprehensive security gateway with a variety of network security functions, become indispensable foundation of network settings. Here we use the research and development of a firewall software to protect the security of Android system.The Android system is a operating system based on the Linux kernel, so Android system is also integrated iptables module. According to this principle, refer to iptables firewall software in Linux system, we can develop a firewall software based on iptables for Android system.In this paper, starting from the security mechanism of Android system and security status of mobile phone system, and then analyzes the defects of security mechanism of Android mobile phone system, and according to these defects, analyse the specific technology of Trojan horse to attack Android system, include the specific design and implementation of Trojan mechanism in Android system. After analyzing a series of security mechanisms and defects, then design and implementation of a suitable Android system security firewall software.
Keywords/Search Tags:Android System, Trojan horse, firewall, iptables
PDF Full Text Request
Related items