INFRASTRUCTURE FOR LEARNING THE BEHAVIOUR OF MALICIOUS AND ABNORMAL APPLICATIONS

被引:1
|
作者
Gheorghe, Laura [1 ]
Mogosanu, Lucian [1 ]
Carabas, Mihai [1 ]
Voiculescu, Valentin-Gabriel [2 ]
Gibson, Gary [2 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp, Splaiul Independentei 313, Bucharest, Romania
[2] VirtualMetrix Inc, Rancho Santa Fe, CA USA
关键词
Android; security; malware;
D O I
10.12753/2066-026X-15-030
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Nowadays, Android is one of the most popular operating systems for mobile devices. Therefore, an increasing number of exploits and malicious applications for Android are developed by attackers. Many Android applications have malicious or abnormal behaviour: stealing private information, subscribing to unwanted paid services, consuming a large amount of resources on the device and displaying unwanted advertisements. Students learning security need to understand the behaviour of such applications. In this paper, we propose an infrastructure for collecting information pertaining to application behaviour at runtime and exposing the malicious and atypical actions performed by Android applications. The purpose of this infrastructure is to provide a meaningful learning experience to students, as they study malicious applications. The infrastructure includes collectors at every level of the operating system and the behaviour information includes: the consumed resources (CPU, memory), the exchanged messages (SMSs, phone calls, packets), the state changes of the communication channels (WiFi, 3G, Bluetooth, NFC). Behaviour information is sent periodically from the collectors to a native application and can be visualised through a Graphical User Interface, directly on the mobile device. Students are allowed to select any process in the system and investigate its behaviour in real time. They also can extract the behaviour information from the mobile device in order to perform statistical analysis on the data. Students are able compare the collected data for legitimate and malicious/abnormal applications and identify the malicious behaviour patterns. These patterns can be used to discover new malware, that is not yet detected by commercial antivirus solutions. The learning experience provided by our infrastructure is essential for developing practical security skills.
引用
收藏
页码:202 / 209
页数:8
相关论文
共 50 条
  • [31] Using Machine Learning Methods to Detect Applications with Abnormal Efficiency
    Shaykhislamov, Denis
    SUPERCOMPUTING, RUSCDAYS 2016, 2016, 687 : 345 - 355
  • [32] Malicious Behaviour Identification in Online Social Networks
    Bin Tareaf, Raad
    Berger, Philipp
    Hennig, Patrick
    Meinel, Christoph
    DISTRIBUTED APPLICATIONS AND INTEROPERABLE SYSTEMS (DAIS 2018), 2018, 10853 : 18 - 25
  • [34] ABNORMAL ILLNESS BEHAVIOUR
    PILOWSKY, I
    BRITISH JOURNAL OF MEDICAL PSYCHOLOGY, 1969, 42 : 347 - &
  • [35] Abnormal illness behaviour
    Mendelson, G
    AUSTRALIAN AND NEW ZEALAND JOURNAL OF PSYCHIATRY, 1998, 32 (04): : 593 - 594
  • [36] Abnormal illness behaviour
    Fava, GA
    PSYCHOTHERAPY AND PSYCHOSOMATICS, 1998, 67 (02) : 109 - 110
  • [37] Abnormal trajectory detection for security infrastructure
    Le, Van-Khoa
    Beauseroy, Pierre
    Grall-Maes, Edith
    2018 2ND INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (ICDSP 2018), 2018, : 1 - 5
  • [38] Detection of Malicious Applications on Android OS
    Di Cerbo, Francesco
    Girardello, Andrea
    Michahelles, Florian
    Voronkova, Svetlana
    COMPUTATIONAL FORENSICS, 2011, 6540 : 138 - +
  • [39] DIMA: machine learning based dynamic infrastructure management for containerized applications
    Shafi, Numan
    Abdullah, Muhammad
    Iqbal, Waheed
    Bukhari, Faisal
    COMPUTING, 2025, 107 (03)
  • [40] Overview of Image Datasets for Deep Learning Applications in Diagnostics of Power Infrastructure
    Ruszczak, Bogdan
    Michalski, Pawel
    Tomaszewski, Michal
    SENSORS, 2023, 23 (16)