首页> 外文会议>IEEE Central America and Panama Convention >Detecting blacklisted URLs from unmodified and non-rooted Android devices
【24h】

Detecting blacklisted URLs from unmodified and non-rooted Android devices

机译:从未修改和非生根的Android设备中检测到黑名单URL

获取原文

摘要

Smart devices are everywhere nowadays, such as smartphones and tablets where the Android platform is dominant in this mobile era. As a consequence of this popularity, the malware targeting Android smartphones has also mushroomed. Android malware is one of the major security issues and fast growing threats facing the Internet in the mobile arena, today. So, in this context, DNS (Domain Name System) is widely misused by miscreants in order to provide internet connection within malicious networks and botnets. In our experiments, we use the MalGenome dataset in order to generate network traffic. Besides, most of the malware we examine use DNS in order to obtain the IP address of their command and control servers. Then, the problem of determining the DNS queries done by the malware through devices without modifying the firmware or rooting smartphone, is very important and it poses a big challenge. From traces we generated from apps under test, we can extract malicious URLs invoked by the malware.
机译:智能设备现在无处不在,例如智能手机和平板电脑,其中Android平台在此移动时代占主导地位。由于这种普及,目标是Android智能手机的恶意软件也熟悉。 Android Malware今天是移动竞技场中互联网面临的主要安全问题和快速增长的威胁之一。因此,在此上下文中,DNS(域名系统)被误解被广泛滥用,以便在恶意网络和僵尸网络中提供互联网连接。在我们的实验中,我们使用Malgenome数据集以生成网络流量。此外,我们检查的大多数恶意软件以获取其命令和控制服务器的IP地址。然后,在不修改固件或生根智能手机的情况下通过设备确定由恶意软件完成的DNS查询的问题非常重要,并且它构成了很大的挑战。从我们从测试的应用程序生成的痕迹,我们可以提取恶意软件调用的恶意URL。

著录项

相似文献

  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号