期刊文献+

基于网络行为的Android恶意软件检测方案 被引量:3

An Android malware detection scheme based on network behavior
下载PDF
导出
摘要 随着科技的进步,智能手机进入了一个高速发展的阶段,Android手机则是其中最主要的推动力.不过随着Android手机普及,由系统自身安全机制缺陷所带来的安全威胁也越来越大.所以针对Android恶意软件设计出高效率、高准确性的检测方案是非常有必要的.笔者设计了一种基于网络行为分析技术的Android恶意软件检测方案.该方案一方面通过对软件的网络行为进行分析,能够准确地判断出该软件是否被篡改为恶意软件;另一方面,借助于云安全技术,将主要的检测工作部署在云端服务器上,使检测工作能够更加高效. With the development of science and technology, the smart-phone was developing rapidly, which Android mobile phone made a great contribution. However, when more and more people chose to use Android mobile phones, the security threat made by its security flaws was much bigger. Therefore, against Android malwares, designing an efficient and accurate detection scheme was very necessary. In this paper, an Android malware detection scheme which based on network behavior analysis technology was designed. The scheme could accurately identify whether the application was injected with malicious codes by analyzing its network behavior. On the other hand, main detection works of the detection scheme were deployed on the cloud servers, which could make the detection more efficient.
出处 《安徽大学学报(自然科学版)》 CAS 北大核心 2016年第5期32-36,共5页 Journal of Anhui University(Natural Science Edition)
基金 国家自然科学基金资助项目(61303263)
关键词 Android恶意软件 网络行为 云安全 检测 Android malware network behavior cloud security detection
  • 相关文献

参考文献15

  • 1FEIZOLLAH A, ANUAR N, SALLEH R, et al. A study of machine learning classifiers for anomaly-based mobile botnet detection[J]. Malaysian Journal of Computer Science, 2013, 26(4):251-265.
  • 2侯勤胜,曹天杰.安卓恶意软件的分析与检测[J].河南科技大学学报(自然科学版),2015,36(5):52-56. 被引量:4
  • 3360互联网安全中心.2014年第三期中国手机安全报告[EB/OL].[2015~0319].http://zt.360.cn/1101061855.phpdtid=1101061451g>did=1101062591.
  • 4ZHOU Y, WANG Z, ZHOU W, et al. Hey, you, get off my market: Detecting malicious apps in official and alternative Android markets[J]. In Proceedings of the 19th Annual Network ~> Distributed System Security Symposium, 2012(2) : 352-365.
  • 5TEUFL P, KRAXBERGER S, ORTHACKER C, et al. Android market analysis with activation patterns[J]. In MOBISEC, 2012,94 : 1-12.
  • 6BARRERA D, KAYACIK H G, VAN (X)RSCHOT P C, et al. A methodology for empirical analysis of permission based security models and its application to android[C]// In Proceedings of the 17th ACM Conference on Computer and Communications Security, New York, USA, 2010.. 73 84.
  • 7FUCHS A, CHAUDHURI A, FOSTER J. Scan droid: automated security certification of Android applications[C],~~ Technical Report, University of Maryland, 2009.
  • 8GRACE M C, ZHOU Y, ZHANG Q, et al. Risk ranker: scalable and accurate zero-day Android malware detection[C]//International Conference on Mobile Systems, 2012: 281-294.
  • 9FENG Y, ANAND S, DILLIG I, et al. Apposcopy: semantics based detection of android malware[C]// Report University of Texas at Austin, 2013.
  • 10I.IU L, YAN G H, ZHANG X W, et al. Virus meter., preventing your cellphone from spies[J]. Lecture Notes in Computer Science, 2009, 57 : 244 264.

二级参考文献77

  • 1Steven M P.Contrary to what you've heard,Android is almost impenetrable to malware[EB/OL].[2014-06-23].http://qz.com/131436/contrary-to-what-youveheard-android-is-almost-impenetrable-to-malware/.
  • 2Zhou Y,Jiang X.An analysis of the AnserverBot trojan[EB/OL].[2014-06-23].http://www.csc.ncsu.edu/faculty/jiang/pubs/AnserverBot_Analysis.pdf.
  • 3F-Secure’s Security Labs.Trojan:Android/BaseBridge.A[EB/OL].[2014-06-23].http://www.fsecure.com/v-descs/trojan_android_basebridge.shtml.
  • 4F-Secure’s Security Labs.Droid KungFu Utilizes an Update Attack[EB/OL].(2011-10-05)[2014-06-23].http://www.f-secure.com/weblog/archives/00002259.html.
  • 5Jiang X X.Security Alert:New Stealthy Android Spyware-Plankton-Found in Official Android Market[EB/OL].[2014-06-23].http://www.csc.ncsu.edu/faculty/jiang/Plankton/.
  • 6Goegre code.Asroot[EB/OL].[2012-02-07].http://code.google.com/p/flashrec/source/browse/#svn%2Ftrunk%2Fandroid-root.
  • 7SEBASTIAN.Android trickery[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2010/07/androidtrickery.html.
  • 8SEBASTIAN.Droid2[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2010/08/droid2.html.
  • 9SEBASTIAN.Zimperlich sources[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2011/02/zimperlich-sources.html.
  • 10SEBASTIAN.adb trickery#2[EB/OL].[2014-06-23].http://c-skills.blogspot.com/2011/01/adbtrickery-again.html.

共引文献49

同被引文献19

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部