Skip to main content

A Design of Network Behavior-Based Malware Detection System for Android

  • Conference paper
Book cover Algorithms and Architectures for Parallel Processing (ICA3PP 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8631))

Abstract

In recent years, the number of mobile terminals is increasing sharply. Due to Android’s open nature and convenience for surfing, many invaders target on Android. In this paper, we propose a network behavior-based malware detection system for Android which is composed of network behavior monitoring module, anomaly network behavior analyzing module and storage module. We collect the network behavior features of applications, classify them via Bayes algorithm and diagnose whether it is malicious. The priority of the system is that it’s aimed the internet characteristics of malware and using network behavior as object of analysis. In theory, the system can detect malware effectively.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Net Qin released the 2013 global mobile phone safety report, http://finance.chinanews.com/it/2014/02-26/5885596.shtml

  2. 2013ISC Experts Detailed: current status and future of network security, http://soft.yesky.com/398/35354398.shtml

  3. Li, Y., Zhai, L., Wang, Z., Ren, Y.: Control Method of Twitter-and SMS-Based Mobile Botnet. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2012. CCIS, vol. 320, pp. 644–650. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  4. Zhai, L.D., Li, Y.: APT Threat Detection and Protection of Network Space. J. Netinfo Security (3), 56–60 (2013)

    Google Scholar 

  5. Yi, L.L., Zhang, N., Liu, D.: Current Situation and Development Trend of Mobile Malware. J. Information and Communications Technologies (2), 75–79 (2013)

    Google Scholar 

  6. Liu, J.R., Wang, W.J., Liu, B.X.: A Trojan horse detection model based on network behavior analysis. In: The 16th National Conference on Nuclear Electronics and Nuclear Detection Technology Academic Annual Meeting, Mianyang, Sichuan (2012)

    Google Scholar 

  7. Dai, S., Liu, Y., Wang, T.: Behavior-based malware detection on mobile phone. In: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1–4. IEEE (2010)

    Google Scholar 

  8. Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15–26. ACM (2011)

    Google Scholar 

  9. Tong, Z.F., Yang, G.: The Detection of Malware Static Behaviors for Android. J. Jiangsu Communication (1), 39–47 (2011)

    Google Scholar 

  10. Zhong, W.: Research on Bayes Classification and its Application in Intrusion Detection. Central South University of Forestory and Technology (2008)

    Google Scholar 

  11. Cai, Z.T., Jiang, M.: Android Malware Detection of Using Naive Bayes Based on Permissions. J. Computer Knowledge and Technology (14), 3288–3291 (2013)

    Google Scholar 

  12. Chandramohan, M., Tan, H.B.K.: Detection of Mobile Malware in the Wild. Computer 45(9), 65–71 (2012)

    Article  Google Scholar 

  13. Google. Android Home Page, http://www.android.com

  14. Jia, W., Han, M.K.: Data Mining Concepts and Technique, 2nd edn. China Machine Press (2006)

    Google Scholar 

  15. Li, W.: The advantages and disadvantages of the commonly used classifiers. J. Technology Trend. (3), 59 (2009)

    Google Scholar 

  16. Zhou, Y.J., Jiang, X.X.: Dissecting Android Malware: Characterization and Evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, May 20-23 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Qi, Y., Cao, M., Zhang, C., Wu, R. (2014). A Design of Network Behavior-Based Malware Detection System for Android. In: Sun, Xh., et al. Algorithms and Architectures for Parallel Processing. ICA3PP 2014. Lecture Notes in Computer Science, vol 8631. Springer, Cham. https://doi.org/10.1007/978-3-319-11194-0_52

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11194-0_52

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11193-3

  • Online ISBN: 978-3-319-11194-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics