Título
A collaborative framework for android malware detection using DNS & dynamic analysisAutor-a
Autor-a (de otra institución)
Otras instituciones
Universidad Nacional de Ingeniería (Nicaragua)Versión
Postprint
Derechos
© 2018 IEEEAcceso
Acceso abiertoVersión del editor
https://doi.org/10.1109/CONCAPAN.2017.8278529Publicado en
IEEE 37th Central America and Panama Convention (CONCAPAN XXXVII) Managua, 15-17 November 2017. IEEE, 2018Editor
IEEEPalabras clave
Android malware
API calls
Dynamic behavior analysis
DNS queries ... [+]
API calls
Dynamic behavior analysis
DNS queries ... [+]
Android malware
API calls
Dynamic behavior analysis
DNS queries
Collaborative framework [-]
API calls
Dynamic behavior analysis
DNS queries
Collaborative framework [-]
Resumen
Nowadays, with the predominance of smart devices such as smartphones, mobile malware attacks have increasingly proliferated. There is an urgent need of detecting potential malicious behaviors so as to ... [+]
Nowadays, with the predominance of smart devices such as smartphones, mobile malware attacks have increasingly proliferated. There is an urgent need of detecting potential malicious behaviors so as to hinder them. Furthermore, Android malware is one of the major security issues and fast growing threats facing the Internet in the mobile arena. At the same time, DNS (Domain Name System) is widely misused by miscreants in order to provide Internet connection within malicious networks. Here, we propose an infrastructure for monitoring the Android applications in a platform-independent manner, introducing hooks in order to trace restricted API calls used at runtime of the application. These traces are collected at a central server were the application behavior filtering, string matching, and visualization takes place. From these traces we can extract malicious URLs and correlate them with DNS service network traffic, enabling us to find presence of malware running at the network level. [-]
Colecciones
- Congresos - Ingeniería [377]