eBiltegia

    • Zer da eBiltegia? 
    •   eBiltegiari buruz
    •   Argitaratu irekian zure ikerketa
    • Sarbide Irekia MUn 
    •   Zer da Zientzia Irekia?
    •   Mondragon Unibertsitatearen dokumentu zientifikoetara eta irakaskuntza-materialetara Sarbide Irekia izateko politika instituzionala
    •   Mondragon Unibertsitatearen ikerketa-datuetara Sarbide Irekia izateko Politika instituzionala
    •   Babes digitalerako jarraibideak
    •   Zure argitalpenak jaso eta zabaldu egiten ditu Bibliotekak
    • Euskara
    • Español
    • English

Laguntzailea:

  • Kontaktua
  • Euskara 
    • Euskara
    • Español
    • English
  • eBiltegia buruz  
    • Zer da eBiltegia? 
    •   eBiltegiari buruz
    •   Argitaratu irekian zure ikerketa
    • Sarbide Irekia MUn 
    •   Zer da Zientzia Irekia?
    •   Mondragon Unibertsitatearen dokumentu zientifikoetara eta irakaskuntza-materialetara Sarbide Irekia izateko politika instituzionala
    •   Mondragon Unibertsitatearen ikerketa-datuetara Sarbide Irekia izateko Politika instituzionala
    •   Babes digitalerako jarraibideak
    •   Zure argitalpenak jaso eta zabaldu egiten ditu Bibliotekak
  • Hasi saioa
Ikusi itema 
  •   eBiltegia MONDRAGON UNIBERTSITATEA
  • Ikerketa-DoktoregoTesiak
  • DoktoregoTesiak-Ingeniaritza
  • Ikusi itema
  •   eBiltegia MONDRAGON UNIBERTSITATEA
  • Ikerketa-DoktoregoTesiak
  • DoktoregoTesiak-Ingeniaritza
  • Ikusi itema
JavaScript is disabled for your browser. Some features of this site may not work without it.
Thumbnail
Ikusi/Ireki
Tesis Oscar Somarriba (3.174Mb)
Erregistro osoa
Eragina

Web of Science   

Google Scholar
Partekatu
EmailLinkedinFacebookTwitter
Gorde erreferentzia
Mendely

Zotero

untranslated

Mets

Mods

Rdf

Marc

Exportar a BibTeX
Izenburua
Dynamic monitoring of Android malware behavior: a DNS-based approach
Egilea
Somarriba jarquin, Oscar Manuel
Zuzendaria(k)
Zurutuza Ortega, Urko
Uribeetxeberria Ezpeleta, Roberto
Irakurtze Data
2019-07-09
Beste instituzio
Universidad de Granada
King's College London
Ikerlan
Universidad de Deusto
Eskubideak
© Oscar Manuel Somarriba Jarquín
Sarbidea
Sarbide irekia
URI
https://hdl.handle.net/20.500.11984/1509
Argitaratzailearen bertsioa
https://doi.org/10.48764/hr43-4x94
Argitaratzailea
Mondragon Unibertsitatea. Goi Eskola Politeknikoa
Gako-hitzak
Dispositivos de control
Dispositivos de transmisión de datos
ODS 8 Trabajo decente y crecimiento económico
ODS 9 Industria, innovación e infraestructura
Laburpena
The increasing technological revolution of the mobile smart devices fosters their wide use. Since mobile users rely on unofficial or thirdparty repositories in order to freely install paid application ... [+]
The increasing technological revolution of the mobile smart devices fosters their wide use. Since mobile users rely on unofficial or thirdparty repositories in order to freely install paid applications, lots of security and privacy issues are generated. Thus, at the same time that Android phones become very popular and growing rapidly their market share, so it is the number of malicious applications targeting them. Yet, current mobile malware detection and analysis technologies are very limited and ineffective. Due to the particular traits of mobile devices such as the power consumption constraints that make unaffordable to run traditional PC detection engines on the device; therefore mobile security faces new challenges, especially on dynamic runtime malware detection. This approach is import because many instructions or infections could happen after an application is installed or executed. On the one hand, recent studies have shown that the network-based analysis, where applications could be also analyzed by observing the network traffic they generate, enabling us to detect malicious activities occurring on the smart device. On the other hand, the aggressors rely on DNS to provide adjustable and resilient communication between compromised client machines and malicious infrastructure. So, having rich DNS traffic information is very important to identify malevolent behavior, then using DNS for malware detection is a logical step in the dynamic analysis because malicious URLs are common and the present danger for cybersecurity. Therefore, the main goal of this thesis is to combine and correlate two approaches: top-down detection by identifying malware domains using DNS traces at the network level, and bottom-up detection at the device level using the dynamic analysis in order to capture the URLs requested on a number of applications to pinpoint the malware. For malware detection and visualization, we propose a system which is based on dynamic analysis of API calls. Thiscan help Android malware analysts in visually inspecting what the application under study does, easily identifying such malicious functions. Moreover, we have also developed a framework that automates the dynamic DNS analysis of Android malware where the captured URLs at the smartphone under scrutiny are sent to a remote server where they are: collected, identified within the DNS server records, mapped the extracted DNS records into this server in order to classify them either as benign or malicious domain. The classification is done through the usage of machine learning. Besides, the malicious URLs found are used in order to track and pinpoint other infected smart devices, not currently under monitoring. [-]
Bildumak
  • Tesiak - Ingeniaritza [238]

Zerrendatu honako honen arabera

eBiltegia osoaKomunitateak & bildumakArgitalpen dataren araberaEgileakIzenburuakMateriakIkerketa taldeakNon argitaratuaBilduma hauArgitalpen dataren araberaEgileakIzenburuakMateriakIkerketa taldeakNon argitaratua

Nire kontua

SartuErregistratu

Estatistikak

Ikusi erabilearen inguruko estatistikak

Nork bildua:

OpenAIREBASERecolecta

Nork balioztatua:

OpenAIRERebiun
MONDRAGON UNIBERTSITATEA | Biblioteka
Kontaktua | Iradokizunak
DSpace
 

 

Nork bildua:

OpenAIREBASERecolecta

Nork balioztatua:

OpenAIRERebiun
MONDRAGON UNIBERTSITATEA | Biblioteka
Kontaktua | Iradokizunak
DSpace