• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services

Vol. 5, No. 8, August 28, 2011
10.3837/tiis.2011.08.006, Download Paper (Free):

Abstract

A method to detect Trojan horses in messaging and Bluetooth in mobile phones by means of monitoring the events produced by the infections is presented in this paper. The structure of the detection approach is split into two modules: the first is the Monitoring module which controls connection requests and sent/received files, and the second is the Graphical User module which shows messages and, under suspicious situations, reports the user about a possible malware. Prototypes have been implemented on different mobile operating systems to test its feasibility on real cellphone malware. Experimental results are shown to be promising since this approach effectively detects various known malware.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
J. A. Ortega, D. Fuentes, J. A. Álvarez, L. Gonzalez-Abril and F. Velasco, "A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services," KSII Transactions on Internet and Information Systems, vol. 5, no. 8, pp. 1457-1471, 2011. DOI: 10.3837/tiis.2011.08.006.

[ACM Style]
Juan A. Ortega, Daniel Fuentes, Juan A. Álvarez, Luis Gonzalez-Abril, and Francisco Velasco. 2011. A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services. KSII Transactions on Internet and Information Systems, 5, 8, (2011), 1457-1471. DOI: 10.3837/tiis.2011.08.006.