INFRASTRUCTURE FOR LEARNING THE BEHAVIOUR OF MALICIOUS AND ABNORMAL APPLICATIONS

被引:1
|
作者
Gheorghe, Laura [1 ]
Mogosanu, Lucian [1 ]
Carabas, Mihai [1 ]
Voiculescu, Valentin-Gabriel [2 ]
Gibson, Gary [2 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp, Splaiul Independentei 313, Bucharest, Romania
[2] VirtualMetrix Inc, Rancho Santa Fe, CA USA
关键词
Android; security; malware;
D O I
10.12753/2066-026X-15-030
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Nowadays, Android is one of the most popular operating systems for mobile devices. Therefore, an increasing number of exploits and malicious applications for Android are developed by attackers. Many Android applications have malicious or abnormal behaviour: stealing private information, subscribing to unwanted paid services, consuming a large amount of resources on the device and displaying unwanted advertisements. Students learning security need to understand the behaviour of such applications. In this paper, we propose an infrastructure for collecting information pertaining to application behaviour at runtime and exposing the malicious and atypical actions performed by Android applications. The purpose of this infrastructure is to provide a meaningful learning experience to students, as they study malicious applications. The infrastructure includes collectors at every level of the operating system and the behaviour information includes: the consumed resources (CPU, memory), the exchanged messages (SMSs, phone calls, packets), the state changes of the communication channels (WiFi, 3G, Bluetooth, NFC). Behaviour information is sent periodically from the collectors to a native application and can be visualised through a Graphical User Interface, directly on the mobile device. Students are allowed to select any process in the system and investigate its behaviour in real time. They also can extract the behaviour information from the mobile device in order to perform statistical analysis on the data. Students are able compare the collected data for legitimate and malicious/abnormal applications and identify the malicious behaviour patterns. These patterns can be used to discover new malware, that is not yet detected by commercial antivirus solutions. The learning experience provided by our infrastructure is essential for developing practical security skills.
引用
收藏
页码:202 / 209
页数:8
相关论文
共 50 条
  • [21] Deep Learning Cookbook: Recipes for your AI Infrastructure and Applications
    Serebryakov, Sergey
    Milojicic, Dejan
    Vassilieva, Natalia
    Fleischman, Stephen
    Clark, Robert D.
    PROCEEDINGS OF THE 2019 FOURTH IEEE INTERNATIONAL CONFERENCE ON REBOOTING COMPUTING (ICRC), 2019, : 16 - 24
  • [22] Design a Deep Learning Model for Dairy Cow Abnormal Behaviour Prediction
    Surana, Jayesh
    Sharma, Sanjay Kumar
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (03) : 2070 - 2076
  • [23] Application of Description Logic Learning in Abnormal Behaviour Detection in Smart Homes
    An Cong Tran
    2015 IEEE RIVF INTERNATIONAL CONFERENCE ON COMPUTING & COMMUNICATION TECHNOLOGIES - RESEARCH, INNOVATION, AND VISION FOR THE FUTURE (RIVF), 2015, : 7 - 12
  • [24] ABNORMAL CROWD BEHAVIOUR DETECTION BASED ON DEEP LEARNING AND SPARSE REPRESENTATION
    Gai, Zhendi
    Liu, Dongmei
    Chang, Faliang
    Li, Nanjun
    INTERNATIONAL JOURNAL OF ROBOTICS & AUTOMATION, 2020, 35 (04): : 322 - 331
  • [25] Abnormal Behaviour: An Introduction to the Study of Abnormal and Anti-Social Behaviour
    Burt, C.
    BRITISH JOURNAL OF MEDICAL PSYCHOLOGY, 1924, 4 : 168 - 169
  • [26] Learning to Detect Malicious URLs
    Ma, Justin
    Saul, Lawrence K.
    Savage, Stefan
    Voelker, Geoffrey M.
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
  • [27] Learning Halfspaces with Malicious Noise
    Klivans, Adam R.
    Long, Philip M.
    Servedio, Rocco A.
    JOURNAL OF MACHINE LEARNING RESEARCH, 2009, 10 : 2715 - 2740
  • [28] Learning Halfspaces with Malicious Noise
    Klivans, Adam R.
    Long, Philip M.
    Servedio, Rocco A.
    AUTOMATA, LANGUAGES AND PROGRAMMING, PT I, 2009, 5555 : 609 - +
  • [29] LEARNING IN THE PRESENCE OF MALICIOUS ERRORS
    KEARNS, M
    LI, M
    SIAM JOURNAL ON COMPUTING, 1993, 22 (04) : 807 - 837
  • [30] Machine Learning Techniques for Detecting Supercomputer Applications with Abnormal Behavior
    Bezrukov, Alexander
    Kokarev, Mikhail
    Shaykhislamov, Denis
    Voevodin, Vadim
    Zhumatiy, Sergey
    PARALLEL COMPUTATIONAL TECHNOLOGIES, PCT 2018, 2018, 910 : 31 - 46