首页> 外文会议>IEEE Central American and Panama Convention >Detecting blacklisted URLs from unmodified and non-rooted Android devices
【24h】

Detecting blacklisted URLs from unmodified and non-rooted Android devices

机译:从未经修改和未经root的Android设备检测列入黑名单的URL

获取原文

摘要

Smart devices are everywhere nowadays, such as smartphones and tablets where the Android platform is dominant in this mobile era. As a consequence of this popularity, the malware targeting Android smartphones has also mushroomed. Android malware is one of the major security issues and fast growing threats facing the Internet in the mobile arena, today. So, in this context, DNS (Domain Name System) is widely misused by miscreants in order to provide internet connection within malicious networks and botnets. In our experiments, we use the MalGenome dataset in order to generate network traffic. Besides, most of the malware we examine use DNS in order to obtain the IP address of their command and control servers. Then, the problem of determining the DNS queries done by the malware through devices without modifying the firmware or rooting smartphone, is very important and it poses a big challenge. From traces we generated from apps under test, we can extract malicious URLs invoked by the malware.
机译:如今,智能设备无处不在,例如智能手机和平板电脑,在此移动时代,Android平台占主导地位。由于这种流行,针对Android智能手机的恶意软件也如雨后春笋般冒出。 Android恶意软件是当今移动领域中互联网面临的主要安全问题和快速增长的威胁之一。因此,在这种情况下,DNS(域名系统)被滥用者广泛滥用,以便在恶意网络和僵尸网络中提供Internet连接。在我们的实验中,我们使用MalGenome数据集来生成网络流量。此外,我们检查的大多数恶意软件都使用DNS来获取其命令和控制服务器的IP地址。然后,确定恶意软件通过设备完成的DNS查询而不修改固件或生根智能手机的问题非常重要,这是一个很大的挑战。从测试中的应用程序生成的跟踪中,我们可以提取由恶意软件调用的恶意URL。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号