期刊文献+

基于云平台的移动支付类恶意软件检测系统的设计与实现 被引量:8

Design and Implementation of a Malware Detection System for Mobile Payment on the Cloud
下载PDF
导出
摘要 在移动通信技术不断发展的今天,各式各样的应用出现在手机终端,其中最具代表性的业务就是移动支付应用,越来越多的用户选择移动终端进行支付,与此同时移动支付安全风险也日益凸显。文章针对移动用户面临的各类支付威胁,设计了一个基于云平台的移动支付类恶意软件检测系统。通过云端和手机端协作的方式,在云端通过Android模拟器模拟特殊的移动支付场景,在移动支付类APP运行前对其进行敏感行为自动化动态测试,输出并解析运行日志,通过自定义的判定规则判断其是否具有恶意行为,从而能够在恶意行为发生前检测出恶意软件。同时手机端设置了二次打包检测和钓鱼短信检测的功能,帮助用户避免下载山寨恶意软件或登录恶意网址后掉入黑客设置的陷阱从而泄露隐私信息,再辅之以静默安装的检测功能,防止子包在手机后台静默安装逃避系统检测,从而更全面有效地保护用户的移动支付安全。最后通过实验验证了该系统的有效性和实用性。 More and more users choose to use mobile terminals for payment. But at the same time, mobile payment security risks are becoming increasingly prominent. In this paper, based on the analysis of a variety of payment threats users faced, we propose a malware detection system for mobile payment on cloud platform. We use the method of combining cloud terminal with the mobile, and simulate the mobile payment through simulator in the cloud to test the sensitive behaviors before APP running, output and parse operation logs, and judge whether it has malicious behavior through the custom rules, which can detect the malicious software before malicious behaviors happen. We also accompany the function of silently installing testing to prevent sub-package silently installing in mobile phone background to escape system testing, which can protect users' mobile payment security more comprehensively and effectively. Finally, the experiments prove effectiveness and practicability of this system.
出处 《信息网络安全》 2016年第1期59-63,共5页 Netinfo Security
基金 国家自然科学基金[61202352] 江苏省自然科学基金[BK20141404] 中央高校基本科研业务费专项资金[30915011322]
关键词 移动支付 二次打包 恶意软件检测 云平台 mobile payments secondary packaging malware detection cloud platform
  • 相关文献

参考文献13

  • 1姬炳帅,李虎,韩伟红,贾焰.面向电子商务的用户异常行为检测研究[J].信息网络安全,2014(9):80-85. 被引量:4
  • 2文伟平,梅瑞,宁戈,汪亮亮.Android恶意软件检测技术分析和应用研究[J].通信学报,2014,35(8):78-85. 被引量:41
  • 3BATYUK L, HERPICH M, Camtepe S A, et al. Using Static Analysis for Automatic Assessment and Mitigation of Unwanted and Malicious Activities within Android Applications[C]//IEEE Computer Society. IEEE 6th International Conference on Malicious and Unwanted Software, October18-19, 2011,Fajardo, Puerto R.ico,USA.Piscataway, NJ: IEEE. 2011: 18-19.
  • 4赵洋,胡龙,熊虎,秦志光.基于沙盒的Android恶意软件动态分析方案[J].信息网络安全,2014(12):21-26. 被引量:10
  • 5BURGUERA I, ZURUTUZA U Nadjm-Tehrani S. Crowdroid: Behavior-based Malware Detection System for Android[C]//ACM. Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, Octobor 17-21, 2011, Chicago, Illinois, USA. New York: ACM, 2011:15-26.
  • 6王丽娜,谈诚,陈栋,等.Android系统中基于移动支付行为特征的恶意检测研究与实现[EB/OL].http://wwwpaper.edu.cn/,2014.
  • 7FUN T S, BENG L Y, LIKOH J, et al. A Lightweight and Private Mobile Payment Protocol by Using Mobile Network Operator[C]// IEEE Computer Society. IEEE International Conference on Computer and Communication Engineering,May 13-15, 2008, International Islamic University, Kuala Lumpur,Malaysia. Piscataway, NJ: IEEE, 2008: 162-166.
  • 8ZHOU Y, JIANG X. Dissecting Android Malware: Characterization and Evolution[C]// IEEE Computer Society. IEEE Symposium on Security and Privacy, May 20-23, 2012, San Francisco,California,USA. Piscataway, N|: IEEE,2012: 95-109.
  • 9兰芸,李宝林.木马恶意软件的电子数据勘查与取证分析初探[J].信息网络安全,2014(5):87-91. 被引量:7
  • 10REHMAN S U, Abid M. An Empirical Research on the User Acceptance of Mobile Payment System[C]//IEEE Computer Society. IEEE International Conference on Information Society, November 10-12, 2014, London,United Kingdom.Piscataway, NJ: IEEE, 2014: 329-335.

二级参考文献47

  • 1张晓惠,林柏钢.基于特征选择和多分类支持向量机的异常检测[J].通信学报,2009,30(S1):68-73. 被引量:20
  • 2缪红保,李卫.基于数据挖掘的用户安全行为分析[J].计算机应用研究,2005,22(2):105-107. 被引量:11
  • 3江伟,陈龙,王国胤.用户行为异常检测在安全审计系统中的应用[J].计算机应用,2006,26(7):1637-1639. 被引量:13
  • 4ZHOU W,ZHOU Y,JIANG X,et al.Detecting repackaged smartphone applications in third-party Android marketplaces[C]// Proceedings of the Second ACM Conference on Data and Application Security and Privacy.New York,USA:ACM,2012:317-326.
  • 5BORJA S,IGOR S,CARLOS L,et al.PUMA:permission usage to detect malware in Android[C]// International Joint Conference CISIS' 12-ICEUTE' 12-SOCO' 12 Special Sessions.Berlin,Germany:Springer,2012:289-298.
  • 6BURGUERA I,ZURUTUZA U,NADJM-TEHRANI S.Crowdroid:behavior-based malware detection system for Android[C]//Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices.New York,USA:ACM,2011:15-26.
  • 7ENCK W,GILBERT P,CHUN B G,et al.TaintDroid:an information-flow tracking system for realtime privacy monitoring on smartphones[C]// Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation.Berkeley,CA,USA:USENIX,2010:1-6.
  • 8ENCK W,ONGTANG M,MCDANIEL P.Understanding Android security[J].IEEE Security & Privacy,2009,7(1):50-57.
  • 9POCATILU P.Android applications security[J].Informatica Economicǎ,2011,15(3):163-171.
  • 10JIANG X.Security alert:new Android malwareHippoSMS-found in alternative Androidmarkets[EB/OL].[2012-10-07].http://www.csc.ncsu.edu/faculty/jiang/HippoSMS/.

共引文献74

同被引文献56

引证文献8

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部