Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)


 
 
Thread Rating:
  • 0 Votes - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Potential Threats to Mobile Network Security
Post: #1

Potential Threats to Mobile Network Security


.doc  Potential.doc (Size: 152 KB / Downloads: 22)

ABSTRACT

Can virus infect the mobile phones? It is a million dollar question that has no answer up to now. The chance is increasing day by day and recent hoax virus, Spam SMS worms is an evidence of it. Due to the financial aspects associated with wireless communications, this subject is under through research now.
The WAP protocol is now the leading standard for information services on wireless terminals like digital mobile phones. By the use of WAP, there is a possibility of wireless devices like mobile phones, getting infected with virus and worms. Though up to now there is no such attack, as the usage of script languages increases, there is a chance of malicious code injection.
Wireless application protocol is an application environment and a set of communication protocols for wireless devices. It enables the wireless devices, independent access to the Internet. WAP bridges the mobile world and the Internet. It also connects the corporate intranets. Due to this users can access the same amount of information by using a packet-sized device as they can from a desktop PC.
The WAP standard is based on Internet standards (HTML, XML and TCP/IP). It consists of a WML language, a WMLScript, and a Wireless Telephony Application Interface (WTAI). The use of WAP-enabled mobile phones is booming. Cellular phones with support for WAP allow users to access a wide variety of services. WAP enables users to do on-line banking, monitor stock markets, use email, and access the Internet – all from their mobile phones. New services are being developed everyday and as more robust scripting becomes possible, the chance for malicious code increases.
This paper will discuss the threats with current WAP protocol and how changes in the protocol and the increase in its usage will enable entry of real viruses. Future threat scenarios are presented along with suggestions to avoid these problems.
This paper also presents an overview on WAP, WAP Push, WML, and WMLScript and their ability to host malicious software. Finally to detect such future threats, potential solution placement will be presented.

1. Introduction

The growth of media on the Internet is motivated by high-speed bandwidth. Concern for small streamlined content is decreasing with the advent of cheap 24x7 high-speed connections for both home and businesses. However, computing devices are becoming smaller and more portable with a relatively lower bandwidth to Internet content -- thus, the desire for a smaller media format. WAP specifically addresses these needs with WML and WMLScript, which is designed for small display sizes, limited input devices, low resource devices, and narrow-band connectivity.

Solution Placement

This section does not discuss the technical solutions of how to detect such threats. Products with the ability to detect current JavaScript or Visual Basic Script threats should require little if any modification to detect future WML and WMLScript threats. This section only discusses the advantages and disadvantages of solution placement.
7.1 On-Device Solution
Placing a scanner on the device can be effective in blocking content, but may be resource intensive and difficult in regards to development. WAP devices vary from phones to personal digital assistants (PDAs) and each of the devices may be running on non-updatable and proprietary operating systems. One could not create a single solution that could be placed on all devices. In addition, updating the firmware or software may be problematic.
While possible, on-device solutions do not seem practically viable.


7.2 Origin Server Solution

Origin servers are generally run on popular operating systems such as Unix or NT. Existing products can scan these servers. The existing products would need to be updated with new signature files to detect malicious WML (Script) code, but this would be trivial for any scanner that can currently handle JavaScript or Visual Basic Script threats.
However, limiting the solution to the origin server does not adequately protect the end user. While the origin server administrator could assure his systems are free from malicious content, the end user could not be assured any origin server visited is free from malicious conten
Post: #2
I need some technical solutions to detect threats on mobile
Post: #3
I want a PowerPoint presentation on potential threats to mobile network security
Post: #4

It's a million dollar question that has no answer so far. The result is increasing day to day scam virus, spam sms worms. Due to the financial aspects associated with wireless communications, this topic is under investigation through now. The WAP protocol is the leading standard in information services on wireless terminals such as digital mobile phones. Using, there is a possibility that wireless devices will become infected with viruses and worms. Although so far fewer attacks of this type, as the use of scripting languages ​​increases, there is a possibility of malicious code injection. The wireless application protocol is an application environment and a set of communication protocols for wireless devices. Allows wireless devices to access the Internet independently. WAP bridges the mobile world and the Internet. It also connects corporate intranets. Because of this, users can access the same amount of information using a packet size device as they can from a desktop PC.

The WAP standard is based on Internet standards (HTML, XML and TCP / IP). It consists of a WML language, a WML script and a wireless telephony application interface (WTAI). The use of mobile phones with WAP is booming. WAP-enabled cell phones allow users to access a wide variety of services. WAP enables users to do online banking, monitor stock markets, use email and access the Internet - all from their mobile phones. The new services are developed every day and as the scripts become more robust, the possibility that the malicious code increases.
This document will discuss the threats with the current WAP protocol and how the changes in the protocol and the increase in its use will allow the entry of real viruses. Future threat scenarios are presented along with suggestions to avoid these problems. This document also presents an overview of WAP, WAP Push, WML and WMLScript and its ability to host malicious software. Finally, to detect future threats, the possible location of the solution will be presented.
The growth of Internet media is motivated by high-speed bandwidth. Concern over small simplified content is diminishing with the advent of cheap 24x7 high speed connections for home and business. However, computing devices are becoming smaller and more portable with a relatively smaller bandwidth for Internet content - hence the desire for a smaller media format. WAP specifically addresses these needs with WML and WMLScript, designed for small screen sizes, limited input devices, low-resource devices, and narrowband connectivity.
WAP model
The WAP programming model is similar to the current HTTP model. WAP consists of a client, a gateway and a source server.

[Image: WAP-Model.png]


1. The user makes a request for content.
2. The WAE (Wireless Application Environment) user agent encodes the request.
3. The WAE user agent sends the request to the gateway.
4. The Gateway decodes the request.
5. The gateway translates the request (to HTTP) and sends it to the source server.
6. The source server returns the appropriate content.
7. If necessary, the gateway translates the content (HTML to WML).
8. The gateway encodes the content.
9. The Gateway sends the encoded content to the Client
10. The WAE user agent interprets the encoded content and presents it to the user.
 

Marked Categories : yhsm inucbr 001, potential threats mobile network security pdf, pdf file for potential threats to mobile network security, introduction of potential threats to mobile network security ppt, ppt on potential threats on mobile network security, potential threats to wireless mobile network system ppt slides, potential threats of mobile network security ppt, potential threat to mobile, potential threats to mobile network security pdf, ppt on potential threat to mobile security, potential threats to mobile network security seminar material pdf, potential threats to mobile network security seminar material, potential threats to mobile network security seminar,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  wireless networks and mobile computing previous question papers Guest 0 0 29-04-2017 09:26 AM
Last Post: Guest
  mobile location alarm project documentation Guest 1 0 27-04-2017 11:31 AM
Last Post: jaseela123
  network monitoring and analysing Guest 1 308 27-04-2017 11:11 AM
Last Post: jaseela123
  revisiting dynamic query protocol in unstructured peer peer network Guest 1 0 25-04-2017 01:46 PM
Last Post: Guest
  object tracking using wireless sensor network in matlab Guest 0 0 22-04-2017 01:17 PM
Last Post: Guest
  synchronization problem in sbi mobile banking Guest 1 226 21-04-2017 04:51 PM
Last Post: jaseela123
  automatic vehicle security system using alcohol sensor Guest 1 172 21-04-2017 11:35 AM
Last Post: jaseela123
  transparent mobile phone technology Guest 1 186 21-04-2017 10:07 AM
Last Post: jaseela123
  ATM NETWORK FOR ONLINE MONITORING SYSTEM Guest 1 555 21-04-2017 09:40 AM
Last Post: jaseela123
  mobile inspection platform for the insfection ppt Guest 1 0 18-04-2017 02:30 PM
Last Post: Guest
This Page May Contain What is Potential Threats to Mobile Network Security And Latest Information/News About Potential Threats to Mobile Network Security,If Not ...Use Search to get more info about Potential Threats to Mobile Network Security Or Ask Here

Options: