Professional Documents
Culture Documents
Aim:
The main aim of this project is to avoid the attacks for smart phones by using cloud environment to detect intrusion and provide response system for mobile phones.
Synopsis:
As smart mobile phones, so called smart phones are getting more complex and more powerful to efficiently provide more functionality concerns are increasing regarding security threats against the smart phone users. Since smart phones use the same software architecture as in PCs, they are vulnerable to similar classes of security risks such as viruses, Trojans, and worms. In this paper, we propose a cloud based smart phonespecific intrusion detection and response engine, which continuously performs an indepth forensics analysis on the smart phone to detect any misbehaviour. In case misbehaviour is detected, the proposed engine decides upon and takes optimal response actions to thwart the ongoing attacks. Despite the computational and storage resource limitations in smart phone devices, the engine can perform a complete and in-depth analysis on the smart phone, since all the investigations are carried out on an emulated device in a cloud environment.
Existing System:
In the past, intrusion process had to be installed in smart phone end users. As another issue, none of the past proposed techniques provide automated response and recovery for the detected security threats. This is essential in order to quickly terminate the attack and restore the phone back to its normal operational mode.
Proposed System:
To address the critical challenge of keeping smart phone secure, cloud-based intrusion detection has been proposed. A synchronized cloud-based intrusion detection and response framework for smart phone devices is proposed.
Modules: Cloud Architecture Design Client registration & proxy process Intrusion detection
Intrusion detection
In case misbehaviour is detected, our intrusion response engine in the emulation environment solves a resource intensive game-theoretic optimization, and sends the selected optimal response action to the agent running on the smart phone device. The agent, then, can take the required actions and recover the smart phone back to its normal secure operational mode.
Software Requirements:
Windows 7 Xampp Eye-Os 2.5 JDK 1.6 Spring 2.5 MySql 3.2 Android 2.2 and above JavaFx 1.3.1
Hardware Requirements:
Hard Disk RAM Processor : : : 80GB and Above 2GB and Above Core i3 and above
Architecture Diagram: