INFRASTRUCTURE FOR LEARNING THE BEHAVIOUR OF MALICIOUS AND ABNORMAL APPLICATIONS

被引:1
|
作者
Gheorghe, Laura [1 ]
Mogosanu, Lucian [1 ]
Carabas, Mihai [1 ]
Voiculescu, Valentin-Gabriel [2 ]
Gibson, Gary [2 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp, Splaiul Independentei 313, Bucharest, Romania
[2] VirtualMetrix Inc, Rancho Santa Fe, CA USA
关键词
Android; security; malware;
D O I
10.12753/2066-026X-15-030
中图分类号
G40 [教育学];
学科分类号
040101 ; 120403 ;
摘要
Nowadays, Android is one of the most popular operating systems for mobile devices. Therefore, an increasing number of exploits and malicious applications for Android are developed by attackers. Many Android applications have malicious or abnormal behaviour: stealing private information, subscribing to unwanted paid services, consuming a large amount of resources on the device and displaying unwanted advertisements. Students learning security need to understand the behaviour of such applications. In this paper, we propose an infrastructure for collecting information pertaining to application behaviour at runtime and exposing the malicious and atypical actions performed by Android applications. The purpose of this infrastructure is to provide a meaningful learning experience to students, as they study malicious applications. The infrastructure includes collectors at every level of the operating system and the behaviour information includes: the consumed resources (CPU, memory), the exchanged messages (SMSs, phone calls, packets), the state changes of the communication channels (WiFi, 3G, Bluetooth, NFC). Behaviour information is sent periodically from the collectors to a native application and can be visualised through a Graphical User Interface, directly on the mobile device. Students are allowed to select any process in the system and investigate its behaviour in real time. They also can extract the behaviour information from the mobile device in order to perform statistical analysis on the data. Students are able compare the collected data for legitimate and malicious/abnormal applications and identify the malicious behaviour patterns. These patterns can be used to discover new malware, that is not yet detected by commercial antivirus solutions. The learning experience provided by our infrastructure is essential for developing practical security skills.
引用
收藏
页码:202 / 209
页数:8
相关论文
共 50 条
  • [41] An abnormal behaviour recognition of MOOC online learning based on multidimensional data mining
    Qu, Meng
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2024, 17 (04) : 369 - 382
  • [42] ANALYSIS OF MALICIOUS APPLICATIONS FOR SYMBIAN SMARTPHONES
    Song, Zheng
    Jin, Bo
    Lin, Jiuchuan
    Zhang, Ying
    2011 3RD INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT (ICCTD 2011), VOL 1, 2012, : 287 - 291
  • [43] Malicious Web Pages Detection Based on Abnormal Visibility Recognition
    Liang, Bin
    Huang, Jianjun
    Liu, Fang
    Wang, Dawei
    Dong, Daxiang
    Liang, Zhaohui
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 6 - 10
  • [44] Detecting Malicious Android Game Applications on Third-Party Stores Using Machine Learning
    Sanamontre, Thanaporn
    Visoottiviseth, Vasaka
    Ragkhitwetsagul, Chaiyong
    ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 4, AINA 2024, 2024, 202 : 238 - 251
  • [45] Family Classification of Malicious Applications using Hybrid Analysis and Computationally Economical Machine Learning Techniques
    Kishore, Pushkar
    Barisal, Swadhin Kumar
    Mohapatra, Durga Prasad
    2022 IEEE/WIC/ACM INTERNATIONAL JOINT CONFERENCE ON WEB INTELLIGENCE AND INTELLIGENT AGENT TECHNOLOGY, WI-IAT, 2022, : 442 - 449
  • [46] Abnormal behavior detection mechanism using deep learning for zero-trust security infrastructure
    Hyun-Woo Kim
    Eun-Ha Song
    International Journal of Information Technology, 2024, 16 (8) : 5091 - 5097
  • [47] Large-Scale Exploration of Feature Sets and Deep Learning Models to Classify Malicious Applications
    Vanderbruggen, Tristan
    Cavazos, John
    2017 RESILIENCE WEEK (RWS), 2017, : 37 - 43
  • [48] Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
    Khan, Muhammad Imran
    O'Sullivan, Barry
    Foley, Simon N.
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 3094 - 3099
  • [49] Detection of Malicious Agents in Social Learning
    Shumovskaia, Valentina
    Kayaalp, Mert
    Sayed, Ali H.
    IEEE SIGNAL PROCESSING LETTERS, 2024, 31 : 1745 - 1749
  • [50] Detecting Malicious Driving with Machine Learning
    Yardy, Kevin
    Almehmadi, Abdulaziz
    El-Khatib, Khalil
    2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,