Android Malware Network Behavior Analysis at HTTP Protocol Packet Level

被引:1
|
作者
Wang, Shanshan [1 ]
Hou, Shifeng [2 ]
Zhang, Lei [1 ]
Chen, Zhenxiang [1 ]
Han, Hongbo [1 ]
机构
[1] Univ Jinan, Sch Informat Sci & Engn, Jinan 250022, Peoples R China
[2] Lib Rizhao Polytech, Rizhao 276826, Peoples R China
来源
ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015 | 2015年 / 9532卷
关键词
Android; Malware; Network traffic; Analyze; Detection;
D O I
10.1007/978-3-319-27161-3_45
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Smart phones, particularly the ones based on Android, have become the most popular devices. The surfing habits of users have been changed from the traditional PC terminal to mobile terminal officially. However, the mobile terminal application exposes more and more problems. Two common ways to analyze malware are source code analysis and dynamic behavior analysis. Researchers pay little attention to the network traffic generated by mobile terminal application. Nevertheless, shell technology makes source code analysis difficult while dynamic behavior analysis consumes too much resource. In fact, normal application and malware perform differently at the network level. We found that the features of HTTP packet are dramatically different in normal traffic and malicious traffic dataset. The application analysis from the perspective of network traffic can provide us a new way to detect malware.
引用
收藏
页码:497 / 507
页数:11
相关论文
共 50 条
  • [31] Malware behavior analysis in isolated miniature network for revealing malware's network activity
    Inoue, Daisuke
    Yoshioka, Katsunari
    Eto, Masashi
    Hoshizawa, Yuji
    Nakao, Koji
    2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1715 - +
  • [32] Virtual Malware Analysis Framework for Android in an Educational Environment
    Paugh, Katie
    Mislan, Richard
    Oh, Tae Hwan
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 187 - 192
  • [33] Static and Dynamic Integrated Analysis Scheme for Android Malware
    Chun-Hao Yung
    Wen-Shenq Juang
    Journal of Electronic Science and Technology, 2017, 15 (03) : 246 - 250
  • [34] An Assistive System for Android Malware Analysis to Increase Malware Analysis Efficiency
    Jadhav, Suyash
    Oh, Tae
    Jeong, Jaehoon
    Kim, Young Ho
    Kim, Jeong Neyo
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 370 - 374
  • [35] Malware Detection in Android via Neural Network using Entropy Features
    Khan, Neeli
    Baig, Duaa
    Khan, Muhammad U. S.
    Abbas, Assad
    Ali, Mazhar
    2021 INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY (FIT 2021), 2021, : 240 - 245
  • [36] Runtime-based Behavior Dynamic Analysis System for Android Malware Detection
    Min, Luoxu
    Cao, Qinghua
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 233 - 236
  • [37] HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis
    Wu, Yueming
    Zou, Deqing
    Yang, Wei
    Li, Xiang
    Jin, Hai
    ISSTA '21: PROCEEDINGS OF THE 30TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2021, : 216 - 229
  • [38] DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android
    Aafer, Yousra
    Du, Wenliang
    Yin, Heng
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 86 - 103
  • [39] A Comparative Study of Android Malware Behavior in Different Contexts
    Boileau, Catherine
    Gagnon, Francois
    Poisson, Jeremie
    Frenette, Simon
    Mejri, Mohamed
    DCNET: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 1, 2016, : 47 - 54
  • [40] Classifying Android Malware with Dynamic Behavior Dependency Graphs
    Lin, Zimin
    Wang, Rui
    Jia, Xiaoqi
    Zhang, Shengzhi
    Wu, ChuanKun
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 378 - 385