2013
DOI: 10.1007/978-3-319-01604-7_38
|View full text |Cite
|
Sign up to set email alerts
|

Infrastructure for Detecting Android Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…8. 3) Attack detectors [119]- [122] that are designed to detect attacks at edge devices and SFEs, and Honeypots [123] that are also installed at SFEs, or edge devices and servers, and used to attract potential attacks and to inform the controller by sending SPs to the SRE. The SPs will contain an attack detection probability that is included in the goal function that the SRE uses for routing control.…”
Section: )mentioning
confidence: 99%
“…8. 3) Attack detectors [119]- [122] that are designed to detect attacks at edge devices and SFEs, and Honeypots [123] that are also installed at SFEs, or edge devices and servers, and used to attract potential attacks and to inform the controller by sending SPs to the SRE. The SPs will contain an attack detection probability that is included in the goal function that the SRE uses for routing control.…”
Section: )mentioning
confidence: 99%
“…Karim et al, proposed a taxonomy for mobile botnets [41]. With emergence of mobile malwares, a taxonomy for mobile malware behavioural detection was proposed [42] followed by an android malware attack vectors taxonomy based on attackers modus-operandi [43]. Khattak et al, proposed taxonomies of botnet features and botnet detection and prevention techniques [36].…”
Section: Related Workmentioning
confidence: 99%
“…112 out of 127 Trojan samples in our dataset make use of backdoors for C&C communication via GET/POST HTTP requests (see Appendix II). Other than file upload, backdoors provide other means or advantages to attackers like remote login or even in-depth reconnaissance without users' knowledge [10], [31], [43]. Analysing web traffic with sniffer like wireshark you can observe payloads associated with GET/POST command and identify if data exfiltration is taking place and what kind of data is being exfiltrated.…”
Section: Backdoorsmentioning
confidence: 99%
“…The malware detector component will be used to detect malicious content. Data relating to identified malicious websites will be provided to the DCI by the honeyclient, which is described in more detail in [8].…”
Section: The Data Collection Infrastructurementioning
confidence: 99%