Reconstruction of Android Applications' Network Behavior Based on Application Layer Traffic

作者: Qun Li , Lei Zhang , Shifeng Hou , Zhenxiang Chen , Hongbo Han

DOI: 10.1007/978-3-319-27161-3_44

关键词:

摘要: In recent years, a dramatic change was bring to us with the rapid development of intelligent terminal technology and popularity mobile services. Android platforms alone have produced staggering revenues, which has attracted cybercriminals increased malware in markets at an alarming rate. However, phone network traffic is used analyze malicious software recently, but this method lack visual way understand behavior as well without integrity explanation. paper, we introduced that can reconstructed applications' based on application layer traffic. We reconstruct two ways, namely, time sequence model connection model, applications by reconstructed, it provides interaction process explanation shows malwares include normal

参考文章(6)
Hossein Falaki, Dimitrios Lymberopoulos, Ratul Mahajan, Srikanth Kandula, Deborah Estrin, A first look at traffic on smartphones internet measurement conference. pp. 281- 287 ,(2010) , 10.1145/1879141.1879176
Zheran Fang, Weili Han, Yingjiu Li, Permission based Android security: Issues and countermeasures Computers & Security. ,vol. 43, pp. 205- 218 ,(2014) , 10.1016/J.COSE.2014.02.007
William Enck, Machigar Ongtang, Patrick McDaniel, Understanding Android Security ieee symposium on security and privacy. ,vol. 7, pp. 50- 57 ,(2009) , 10.1109/MSP.2009.26
Yajin Zhou, Xuxian Jiang, Dissecting Android Malware: Characterization and Evolution ieee symposium on security and privacy. pp. 95- 109 ,(2012) , 10.1109/SP.2012.16
Jehyun Lee, Heejo Lee, GMAD: Graph-based Malware Activity Detection by DNS traffic analysis Computer Communications. ,vol. 49, pp. 33- 47 ,(2014) , 10.1016/J.COMCOM.2014.04.013
Lizhi Peng, Zhenxiang Chen, Hongbo Han, Jin Li, Qiben Yan, Bo Yang, Lei Zhang, A First Look at Android Malware Traffic in First Few Minutes trust, security and privacy in computing and communications. ,vol. 1, pp. 206- 213 ,(2015) , 10.1109/TRUSTCOM-BIGDATASE-ISPA.2015.376