Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Potential Threats to Mobile Network Security
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Potential Threats to Mobile Network Security

[attachment=65379]

ABSTRACT

Can virus infect the mobile phones? It is a million dollar question that has no answer up to now. The chance is increasing day by day and recent hoax virus, Spam SMS worms is an evidence of it. Due to the financial aspects associated with wireless communications, this subject is under through research now.
The WAP protocol is now the leading standard for information services on wireless terminals like digital mobile phones. By the use of WAP, there is a possibility of wireless devices like mobile phones, getting infected with virus and worms. Though up to now there is no such attack, as the usage of script languages increases, there is a chance of malicious code injection.
Wireless application protocol is an application environment and a set of communication protocols for wireless devices. It enables the wireless devices, independent access to the Internet. WAP bridges the mobile world and the Internet. It also connects the corporate intranets. Due to this users can access the same amount of information by using a packet-sized device as they can from a desktop PC.
The WAP standard is based on Internet standards (HTML, XML and TCP/IP). It consists of a WML language, a WMLScript, and a Wireless Telephony Application Interface (WTAI). The use of WAP-enabled mobile phones is booming. Cellular phones with support for WAP allow users to access a wide variety of services. WAP enables users to do on-line banking, monitor stock markets, use email, and access the Internet – all from their mobile phones. New services are being developed everyday and as more robust scripting becomes possible, the chance for malicious code increases.
This paper will discuss the threats with current WAP protocol and how changes in the protocol and the increase in its usage will enable entry of real viruses. Future threat scenarios are presented along with suggestions to avoid these problems.
This paper also presents an overview on WAP, WAP Push, WML, and WMLScript and their ability to host malicious software. Finally to detect such future threats, potential solution placement will be presented.

1. Introduction

The growth of media on the Internet is motivated by high-speed bandwidth. Concern for small streamlined content is decreasing with the advent of cheap 24x7 high-speed connections for both home and businesses. However, computing devices are becoming smaller and more portable with a relatively lower bandwidth to Internet content -- thus, the desire for a smaller media format. WAP specifically addresses these needs with WML and WMLScript, which is designed for small display sizes, limited input devices, low resource devices, and narrow-band connectivity.

Solution Placement

This section does not discuss the technical solutions of how to detect such threats. Products with the ability to detect current JavaScript or Visual Basic Script threats should require little if any modification to detect future WML and WMLScript threats. This section only discusses the advantages and disadvantages of solution placement.
7.1 On-Device Solution
Placing a scanner on the device can be effective in blocking content, but may be resource intensive and difficult in regards to development. WAP devices vary from phones to personal digital assistants (PDAs) and each of the devices may be running on non-updatable and proprietary operating systems. One could not create a single solution that could be placed on all devices. In addition, updating the firmware or software may be problematic.
While possible, on-device solutions do not seem practically viable.


7.2 Origin Server Solution

Origin servers are generally run on popular operating systems such as Unix or NT. Existing products can scan these servers. The existing products would need to be updated with new signature files to detect malicious WML (Script) code, but this would be trivial for any scanner that can currently handle JavaScript or Visual Basic Script threats.
However, limiting the solution to the origin server does not adequately protect the end user. While the origin server administrator could assure his systems are free from malicious content, the end user could not be assured any origin server visited is free from malicious conten

Guest

I need some technical solutions to detect threats on mobile

Guest

I want a PowerPoint presentation on potential threats to mobile network security
It's a million dollar question that has no answer so far. The result is increasing day to day scam virus, spam sms worms. Due to the financial aspects associated with wireless communications, this topic is under investigation through now. The WAP protocol is the leading standard in information services on wireless terminals such as digital mobile phones. Using, there is a possibility that wireless devices will become infected with viruses and worms. Although so far fewer attacks of this type, as the use of scripting languages ​​increases, there is a possibility of malicious code injection. The wireless application protocol is an application environment and a set of communication protocols for wireless devices. Allows wireless devices to access the Internet independently. WAP bridges the mobile world and the Internet. It also connects corporate intranets. Because of this, users can access the same amount of information using a packet size device as they can from a desktop PC.

The WAP standard is based on Internet standards (HTML, XML and TCP / IP). It consists of a WML language, a WML script and a wireless telephony application interface (WTAI). The use of mobile phones with WAP is booming. WAP-enabled cell phones allow users to access a wide variety of services. WAP enables users to do online banking, monitor stock markets, use email and access the Internet - all from their mobile phones. The new services are developed every day and as the scripts become more robust, the possibility that the malicious code increases.
This document will discuss the threats with the current WAP protocol and how the changes in the protocol and the increase in its use will allow the entry of real viruses. Future threat scenarios are presented along with suggestions to avoid these problems. This document also presents an overview of WAP, WAP Push, WML and WMLScript and its ability to host malicious software. Finally, to detect future threats, the possible location of the solution will be presented.
The growth of Internet media is motivated by high-speed bandwidth. Concern over small simplified content is diminishing with the advent of cheap 24x7 high speed connections for home and business. However, computing devices are becoming smaller and more portable with a relatively smaller bandwidth for Internet content - hence the desire for a smaller media format. WAP specifically addresses these needs with WML and WMLScript, designed for small screen sizes, limited input devices, low-resource devices, and narrowband connectivity.
WAP model
The WAP programming model is similar to the current HTTP model. WAP consists of a client, a gateway and a source server.

[Image: WAP-Model.png]

1. The user makes a request for content.
2. The WAE (Wireless Application Environment) user agent encodes the request.
3. The WAE user agent sends the request to the gateway.
4. The Gateway decodes the request.
5. The gateway translates the request (to HTTP) and sends it to the source server.
6. The source server returns the appropriate content.
7. If necessary, the gateway translates the content (HTML to WML).
8. The gateway encodes the content.
9. The Gateway sends the encoded content to the Client
10. The WAE user agent interprets the encoded content and presents it to the user.