eBiltegia

    • Euskara
    • Español
    • English
  • Contact Us
  • English 
    • Euskara
    • Español
    • English
  • About eBiltegia  
    • What is eBiltegia? 
    •   About eBiltegia
    •   Publish your research in open access
    • Open Access at MU 
    •   What is Open Science?
    •   Open Access institutional policy
    •   The Library compiles and disseminates your publications
  • Login
View Item 
  •   eBiltegia MONDRAGON UNIBERTSITATEA
  • Scientific production - Conferences
  • Conferences - Engineering
  • View Item
  •   eBiltegia MONDRAGON UNIBERTSITATEA
  • Scientific production - Conferences
  • Conferences - Engineering
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.
Thumbnail
View/Open
A collaborative framework for android malware detection using DNS & dynamic analysis.pdf (697.3Kb)
Full record
Impact

Web of Science   

Google Scholar
Microsoft Academic
Share
Save the reference
Mendely

untranslated

Mets

Mods

Rdf

Marc
Title
A collaborative framework for android malware detection using DNS & dynamic analysis
Author
Zurutuza, UrkoMondragon Unibertsitatea
Author (from another institution)
Somarriba Jarquin, Oscar Manuel
Research Group
Análisis de datos y ciberseguridad
Published Date
2018
Publisher
IEEE
Keywords
Android malware
API calls
Dynamic behavior analysis
DNS queries ... [+]
Android malware
API calls
Dynamic behavior analysis
DNS queries
Collaborative framework [-]
Abstract
Nowadays, with the predominance of smart devices such as smartphones, mobile malware attacks have increasingly proliferated. There is an urgent need of detecting potential malicious behaviors so as to ... [+]
Nowadays, with the predominance of smart devices such as smartphones, mobile malware attacks have increasingly proliferated. There is an urgent need of detecting potential malicious behaviors so as to hinder them. Furthermore, Android malware is one of the major security issues and fast growing threats facing the Internet in the mobile arena. At the same time, DNS (Domain Name System) is widely misused by miscreants in order to provide Internet connection within malicious networks. Here, we propose an infrastructure for monitoring the Android applications in a platform-independent manner, introducing hooks in order to trace restricted API calls used at runtime of the application. These traces are collected at a central server were the application behavior filtering, string matching, and visualization takes place. From these traces we can extract malicious URLs and correlate them with DNS service network traffic, enabling us to find presence of malware running at the network level. [-]
URI
https://hdl.handle.net/20.500.11984/5932
Publisher’s version
https://doi.org/10.1109/CONCAPAN.2017.8278529
ISBN
9781538635094
Published at
IEEE 37th Central America and Panama Convention (CONCAPAN XXXVII)  Managua, 15-17 November 2017. IEEE, 2018
Document type
Conference paper
Version
Postprint – Accepted Manuscript
Rights
© 2018 IEEE
Access
Open Access
Collections
  • Conferences - Engineering [244]

Browse

All of eBiltegiaCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsResearch groupsPublished atThis CollectionBy Issue DateAuthorsTitlesSubjectsResearch groupsPublished at

My Account

LoginRegister

Statistics

View Usage Statistics

Harvested by:

OpenAIREBASE

Validated by:

OpenAIRERebiun
MONDRAGON UNIBERTSITATEA | Library
Contact Us | Send Feedback
DSpace
 

 

Harvested by:

OpenAIREBASE

Validated by:

OpenAIRERebiun
MONDRAGON UNIBERTSITATEA | Library
Contact Us | Send Feedback
DSpace