INFRASTRUCTURE FOR LEARNING THE BEHAVIOUR OF MALICIOUS AND ABNORMAL APPLICATIONS

被引:1
|
作者
Gheorghe, Laura [1 ]
Mogosanu, Lucian [1 ]
Carabas, Mihai [1 ]
Voiculescu, Valentin-Gabriel [2 ]
Gibson, Gary [2 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp, Splaiul Independentei 313, Bucharest, Romania
[2] VirtualMetrix Inc, Rancho Santa Fe, CA USA
关键词
Android; security; malware;
D O I
10.12753/2066-026X-15-030
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Nowadays, Android is one of the most popular operating systems for mobile devices. Therefore, an increasing number of exploits and malicious applications for Android are developed by attackers. Many Android applications have malicious or abnormal behaviour: stealing private information, subscribing to unwanted paid services, consuming a large amount of resources on the device and displaying unwanted advertisements. Students learning security need to understand the behaviour of such applications. In this paper, we propose an infrastructure for collecting information pertaining to application behaviour at runtime and exposing the malicious and atypical actions performed by Android applications. The purpose of this infrastructure is to provide a meaningful learning experience to students, as they study malicious applications. The infrastructure includes collectors at every level of the operating system and the behaviour information includes: the consumed resources (CPU, memory), the exchanged messages (SMSs, phone calls, packets), the state changes of the communication channels (WiFi, 3G, Bluetooth, NFC). Behaviour information is sent periodically from the collectors to a native application and can be visualised through a Graphical User Interface, directly on the mobile device. Students are allowed to select any process in the system and investigate its behaviour in real time. They also can extract the behaviour information from the mobile device in order to perform statistical analysis on the data. Students are able compare the collected data for legitimate and malicious/abnormal applications and identify the malicious behaviour patterns. These patterns can be used to discover new malware, that is not yet detected by commercial antivirus solutions. The learning experience provided by our infrastructure is essential for developing practical security skills.
引用
收藏
页码:202 / 209
页数:8
相关论文
共 50 条
  • [1] DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications
    Gupta, Charu
    Singh, Rakesh Kumar
    Bhatia, Simran Kaur
    Mohapatra, Amar Kumar
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2020, 14 (04) : 57 - 73
  • [2] Detecting malicious behaviour using supervised learning algorithms of the function calls
    Alazab, Mamoun
    Venkatraman, Sitalakshmi
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2013, 5 (02) : 90 - 109
  • [3] Deep Learning Based Detection Method for SDN Malicious Applications
    Chi Yaping
    Yu Yuzhou
    Yang Jianxi
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL III: SYSTEMS, 2020, 517 : 96 - 104
  • [4] A hybrid machine learning approach for malicious behaviour detection and recognition in cloud computing
    Rabbani, Mahdi
    Wang, Yong Li
    Khoshkangini, Reza
    Jelodar, Hamed
    Zhao, Ruxin
    Hu, Peng
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 151
  • [5] Machine learning and deep learning techniques for detecting malicious android applications: An empirical analysis
    Parnika Bhat
    Sunny Behal
    Kamlesh Dutta
    Proceedings of the Indian National Science Academy, 2023, 89 : 429 - 444
  • [6] Machine learning and deep learning techniques for detecting malicious android applications: An empirical analysis
    Bhat, Parnika
    Behal, Sunny
    Dutta, Kamlesh
    PROCEEDINGS OF THE INDIAN NATIONAL SCIENCE ACADEMY, 2023, 89 (03): : 429 - 444
  • [7] Framework to Analyze Malicious Behaviour in Cloud Environment using Machine Learning Techniques
    Jha, Pranay
    Sharma, Ashok
    2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,
  • [8] Autonomous Abnormal Behaviour Detection in Intelligence Surveillance and Reconnaissance Applications
    Meo, R.
    Esposito, R.
    Botta, M.
    Viola, S.
    Choor, C. M.
    Mellano, V.
    Ciaramaglia, F.
    2015 IEEE 1ST INTERNATIONAL FORUM ON RESEARCH AND TECHNOLOGIES FOR SOCIETY AND INDUSTRY (RTSI 2015) PROCEEDINGS, 2015,
  • [9] Towards a Scalable and Distributed Infrastructure for Deep Learning Applications
    Hasheminezhad, Bita
    Shirzad, Shahrzad
    Wu, Nanmiao
    Diehl, Patrick
    Schulz, Hannes
    Kaiser, Hartmut
    PROCEEDINGS OF 2020 IEEE/ACM 5TH WORKSHOP ON DEEP LEARNING ON SUPERCOMPUTERS (DLS 2020), 2020, : 20 - 30
  • [10] Tracing the Abnormal Behavior of Malicious Nodes in MANET
    Karjee, Jyotirmoy
    Banerjee, Sudipta
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4869 - +