SCREDENT: Scalable Real-time Anomalies Detection and Notification of Targeted Malware in Mobile Devices

作者: Paul McNeil , Sachin Shetty , Divya Guntu , Gauree Barve

DOI: 10.1016/J.PROCS.2016.04.254

关键词:

摘要: Abstract The ubiquitous availability of Android devices has led to increasing malicious mobile attacks targeting the operating system. In recent times, adversaries leverage situational awareness, user and device context create targeted malware for devices. Several security tools such as Mobile Sandbox, TargetDroid, ANANAS focus on tailoring detection schemes individual users suffer from scalability by analyzing user's activities. To best our knowledge, these do not incorporate group profiling in their automated user-behavior driven dynamic analysis. addition, adaptive location-based alerts are provided users. We propose SCREDENT: Scalable Real-time Anomalies Detection Notification Targeted Malware Devices, provide a scalable system classify, detect, predict real-time. SCREDENT incorporates behavior-triggering probabilistic models grouping minimize number parallel analysis instances needed. leverages container technology perform allow modularity emulation improves. uses adaptive, notification principles geographical fence which warn attacks. Finally, provides proactive, if at least one members triggered activities an application currently used individual.

参考文章(24)
Guillermo Suarez-Tangil, Mauro Conti, Juan E. Tapiador, Pedro Peris-Lopez, Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models european symposium on research in computer security. ,vol. 8712, pp. 183- 201 ,(2014) , 10.1007/978-3-319-11203-9_11
Jorge L. Reyes-Ortiz, Luca Oneto, Davide Anguita, Big Data Analytics in the Cloud: Spark on Hadoop vs MPI/OpenMP on Beowulf Procedia Computer Science. ,vol. 53, pp. 121- 130 ,(2015) , 10.1016/J.PROCS.2015.07.286
Fabrice Bellard, QEMU, a fast and portable dynamic translator usenix annual technical conference. pp. 41- 41 ,(2005)
Gaute Wangen, The Role of Malware in Reported Cyber Espionage: A Review of the Impact and Mechanism Information-an International Interdisciplinary Journal. ,vol. 6, pp. 183- 211 ,(2015) , 10.3390/INFO6020183
Martina Lindorfer, Matthias Neugschwandtner, Christian Platzer, None, MARVIN: Efficient and Comprehensive Mobile App Classification through Static and Dynamic Analysis computer software and applications conference. ,vol. 2, pp. 422- 433 ,(2015) , 10.1109/COMPSAC.2015.103
Thanh Nhan Bui, Analysis of Docker Security arXiv: Cryptography and Security. ,(2015)
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, Yael Weiss, Andromaly: a behavioral malware detection framework for android devices intelligent information systems. ,vol. 38, pp. 161- 190 ,(2012) , 10.1007/S10844-010-0148-X
Markus Zeilinger, Michael Rodler, Dieter Vymazal, Thomas Eder, ANANAS - A Framework for Analyzing Android Applications availability, reliability and security. pp. 711- 719 ,(2013) , 10.1109/ARES.2013.93
Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, Crowdroid Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. pp. 15- 26 ,(2011) , 10.1145/2046614.2046619
Shweta Bhandari, Rishabh Gupta, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari, Maxim Anikeev, DRACO: DRoid analyst combo an android malware analysis framework security of information and networks. pp. 283- 289 ,(2015) , 10.1145/2799979.2800003