期刊文献+

Analysis of Malware Application Based on Massive Network Traffic 被引量:4

Analysis of Malware Application Based on Massive Network Traffic
下载PDF
导出
摘要 Security and privacy issues are magnified by velocity, volume, and variety of big data. User's privacy is an even more sensitive topic attracting most people's attention. While XcodeGhost, a malware of i OS emerging in late 2015, leads to the privacy-leakage of a large number of users, only a few studies have examined XcodeGhost based on its source code. In this paper we describe observations by monitoring the network activities for more than 2.59 million i Phone users in a provincial area across 232 days. Our analysis reveals a number of interesting points. For example, we propose a decay model for the prevalence rate of Xcode Ghost and we find that the ratio of the infected devices is more than 60%; that a lot of popular applications, such as Wechat, railway 12306, didi taxi, Youku video are also infected; and that the duration as well as the traffic volume of most Xcode Ghost-related HTTP-requests is similar with usual HTTP-request which makes it difficult to be found. Besides, we propose a heuristic model based on fingerprint and its web-knowledge to identify the infected applications. The identifying result shows the efficiency of this model. Security and privacy issues are magni- fied by velocity, volume, and variety of big data. User's privacy is an even more sensitive topic attracting most people's attention. While Xcode- Ghost, a malware of iOS emerging in late 2015, leads to the privacy-leakage of a large number of users, only a few studies have examined Xcode- Ghost based on its source code. In this paper we describe observations by monitoring the network activities for more than 2.59 million iPhone users in a provincial area across 232 days. Our analysis reveals a number of interesting points. For exam- ple, we propose a decay model for the prevalence rate of XcodeGhost and we find that the ratio of the infected devices is more than 60%; that a lot of popular applications, such as Wechat, railway 12306, didi taxi, Youku video are also infected; and that the duration as well as the traffic volume of most XcodeGhost-related HTTP-requests is similar with usual HTTP-request which makes it difficult to be found. Besides, we propose a heuristic model based on fingerprint and its web-knowledge to identify the infected applications. The identifying result shows the efficiency of this model.
出处 《China Communications》 SCIE CSCD 2016年第8期209-221,共13页 中国通信(英文版)
基金 supported by 111 Project of China under Grant No.B08004
关键词 Xcode Ghost big data network security applications identification XcodeGhost big data network secu- rity applications identification
  • 相关文献

参考文献2

二级参考文献13

  • 1Okabe T, Kitamura T, Shizuno T. Statistical traffic identification method based on flow-level behavior for fair VoIP service [ C] // IEEE Workshop on VoIP Management and Security. Vancouver: IEEE Press, 2006: 35- 40.
  • 2Karagiannis T, Papagiannaki K, Faloutsos M. BLINC: multilevel traffic classification in the dark [ C] //ACM SIGCOMM 2005. Philadelphia: ACM Press, 2005: 229-240.
  • 3Webb A R. Statistical pattern recognition[ M]. 2nd ed. England: Wiley, 2004: 161-162.
  • 4Logg C. Characterization of the traffic between SLAC and the Internet [ EB/OL ]. [ 2007-06-13 ]. http: // www. slac. stanford. edu/comp/net/slac-netflow/html/ SLAC-netflow. html.
  • 5Moore D, Keys K, Koga R, et al. Claffy CoralReef software suite as a tool for system and network administrators [C]//Burgess M. Proceedings of the LISA 2001 15th Systems Administration Conference. San Diego: USENIX, 2001: 133-144.
  • 6San S, Spatscheck O, Wang D. Accurate, scalable innetwork identification of P2P traffic using application signatures[C] // Proceeding of the 13th Internation World Wide Web Conference. NY: ACM Press, 2004: 512- 521.
  • 7Haffner P, Sen S, Spatscheck O, et al. ACAS: automated construction of application signatures [ C]//ACM SIGCOMM Workshop on MineNet 2005. Philadelphia: ACM Press, 2005: 197-202.
  • 8Cisco IOS Documentation. Network-based application recognition and distributed network-based application recognition [ EB/OL]. [ 2007-06-13 ]. http ://www. cisco. com/univercd/cc/td/doc/product/software/ios122/ 122newft/122t/122t8/dtnbarad. htm.
  • 9Moore A W, Zuev D. Internet traffic classification using Bayesian analysis techniques [ C ]//ACM SIGMETRICS. New York: ACM Press, 2005: 50-60.
  • 10Auld T, Moore A W, Gull S F. Bayesian neural networks for Internet traffic classification [J]. IEEE Trans on Neural Network, 2007, 18(1) :223-239.

共引文献20

同被引文献25

引证文献4

二级引证文献45

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部