Abstract
In recent years, the number of mobile terminals is increasing sharply. Due to Android’s open nature and convenience for surfing, many invaders target on Android. In this paper, we propose a network behavior-based malware detection system for Android which is composed of network behavior monitoring module, anomaly network behavior analyzing module and storage module. We collect the network behavior features of applications, classify them via Bayes algorithm and diagnose whether it is malicious. The priority of the system is that it’s aimed the internet characteristics of malware and using network behavior as object of analysis. In theory, the system can detect malware effectively.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Net Qin released the 2013 global mobile phone safety report, http://finance.chinanews.com/it/2014/02-26/5885596.shtml
2013ISC Experts Detailed: current status and future of network security, http://soft.yesky.com/398/35354398.shtml
Li, Y., Zhai, L., Wang, Z., Ren, Y.: Control Method of Twitter-and SMS-Based Mobile Botnet. In: Yuan, Y., Wu, X., Lu, Y. (eds.) ISCTCS 2012. CCIS, vol. 320, pp. 644–650. Springer, Heidelberg (2013)
Zhai, L.D., Li, Y.: APT Threat Detection and Protection of Network Space. J. Netinfo Security (3), 56–60 (2013)
Yi, L.L., Zhang, N., Liu, D.: Current Situation and Development Trend of Mobile Malware. J. Information and Communications Technologies (2), 75–79 (2013)
Liu, J.R., Wang, W.J., Liu, B.X.: A Trojan horse detection model based on network behavior analysis. In: The 16th National Conference on Nuclear Electronics and Nuclear Detection Technology Academic Annual Meeting, Mianyang, Sichuan (2012)
Dai, S., Liu, Y., Wang, T.: Behavior-based malware detection on mobile phone. In: 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1–4. IEEE (2010)
Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15–26. ACM (2011)
Tong, Z.F., Yang, G.: The Detection of Malware Static Behaviors for Android. J. Jiangsu Communication (1), 39–47 (2011)
Zhong, W.: Research on Bayes Classification and its Application in Intrusion Detection. Central South University of Forestory and Technology (2008)
Cai, Z.T., Jiang, M.: Android Malware Detection of Using Naive Bayes Based on Permissions. J. Computer Knowledge and Technology (14), 3288–3291 (2013)
Chandramohan, M., Tan, H.B.K.: Detection of Mobile Malware in the Wild. Computer 45(9), 65–71 (2012)
Google. Android Home Page, http://www.android.com
Jia, W., Han, M.K.: Data Mining Concepts and Technique, 2nd edn. China Machine Press (2006)
Li, W.: The advantages and disadvantages of the commonly used classifiers. J. Technology Trend. (3), 59 (2009)
Zhou, Y.J., Jiang, X.X.: Dissecting Android Malware: Characterization and Evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, May 20-23 (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Qi, Y., Cao, M., Zhang, C., Wu, R. (2014). A Design of Network Behavior-Based Malware Detection System for Android. In: Sun, Xh., et al. Algorithms and Architectures for Parallel Processing. ICA3PP 2014. Lecture Notes in Computer Science, vol 8631. Springer, Cham. https://doi.org/10.1007/978-3-319-11194-0_52
Download citation
DOI: https://doi.org/10.1007/978-3-319-11194-0_52
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11193-3
Online ISBN: 978-3-319-11194-0
eBook Packages: Computer ScienceComputer Science (R0)