DroidCheck: Android Malware Detection by Behavioral Techniques and Honeypot
نویسندگان
چکیده
Android, the name is quite enough to show its dominance in the mobile computing world. Android is now the market leader among all its competitors. As, it is the largest shareholder in the market it has become bull’s eye for the attackers. Security is one of the major concerns for android users today. It has become the most viable target of security threats. With the increase in power and features of android applications, the vulnerability for malware attacks has increased. Malware can be detected in two ways either statically or dynamically. Most anti-malware applications use static analysis for detection but they can be easily obfuscated, also they require regular updates. Static analysis use techniques like signature verification which is good for known malware but fails in case of unknown malware. Dynamic analysis means behavioural analysis of malicious application taking into consideration certain parameters like asking for permissions while installation, monitoring system calls, observing network traffic, extracting information from android manifest file. The technique illustrated in this paper not only detects known malware but it is also useful in case of unknown malware. Besides this, it lures more and more malware to attack by using the tool Honeypot. Honeypot helps in maintaining repository of maximum types of malware present in the cyber world. So, by this proposed method we cannot only detect malware but also we can collect unknown and infectious malware as well. Keywords— Behavioural detection, Honeypots, Malicious applications, Malware, Manifest files, Security, Static detection
منابع مشابه
Trends In Android Malware Detection
This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewe...
متن کاملBehavioral Signature Generation using Shadow Honeypot
A novel behavioral detection framework is proposed to detect zero day buffer overflow vulnerabilities (based on network behavioral signatures) using zero-day exploits, instead of the signature-based or anomaly-based detection solutions currently available for IDPS techniques. At first we present the detection model that uses shadow honeypot. Our system is used for the online processing of netwo...
متن کاملDetection of Repackaged Android Malware with Code-Heterogeneity Features
During repackaging, malware writers statically inject malcode and modify the control flow to ensure its execution. Repackaged malware is difficult to detect by existing classification techniques, partly because of their behavioral similarities to benign apps. By exploring the app’s internal different behaviors, we propose a new Android repackaged malware detection technique based on code hetero...
متن کاملMaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models
The rise in popularity of the Android platform has resulted in an explosion of malware threats targeting it. As both Android malware and the operating system itself constantly evolve, it is very challenging to design robust malware mitigation techniques that can operate for long periods of time without the need for modifications or costly re-training. In this paper, we present MAMADROID, an And...
متن کاملHoneypotlabsac: a Virtual Honeypot Framework for Android
Mobile devices suffer daily threats of various kinds, in particular in a digital form, where users without consent receives and installs malware on their mobile devices via wireless networks, getting their information vulnerable to unauthorized persons. Aiming to learn more targeted attacks on mobile devices, this paper presents a mechanism that emulates services and protocols within a mobile d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015