ANDROID MALWARE CLASSIFICATION APPROACH BASED ON HOST-LEVEL ENCRYPTED TRAFFIC SHAPING

Main Article Content

Аннотация:

With the development of mobile terminals, smartphones have attracted a very huge number of users with their powerful functions. Among them, Android system is famous for its opensource and convenience, which occupies a large market share. But this also leads many attackers to use their malware to gain benefits quickly, which make it necessary to design a practical android malware detection approach. At present, there are not many pieces of research on detecting malware by analyzing Android malicious traffic.

Article Details

Как цитировать:

Latipova , N. ., & Ibragimov , J. . (2022). ANDROID MALWARE CLASSIFICATION APPROACH BASED ON HOST-LEVEL ENCRYPTED TRAFFIC SHAPING. Евразийский журнал академических исследований, 2(13), 1058–1064. извлечено от https://in-academy.uz/index.php/ejar/article/view/7767

Библиографические ссылки:

“(Online) Smartphone Users Report 2020”. Available: https://www.statista.com/statistics/330695/number-ofsmartphone-users-worldwide/

“(Online) IDC Smartphone Report 2019”. Available: https://www.idc.com/getdoc.jsp?containerId=prUS454 87719

“(Online) 360 Smartphone Security 2020”. Available: https://zt.360.cn/1101061855.php?dtid=1101061451& did=610637885

Ahmed, Mohiuddin, Abdun Naser Mahmood, and Jiankun Hu, "A survey of network anomaly detection techniques." Journal of Network and Computer

Applications, Vol 60, pp. 19-31, Jan. 2016.

Biersack, Ernst , C. Callegari , and M. Matijasevic . Data Traffic Monitoring and Analysis. Springer Berlin Heidelberg, 2013.

Y. Zhou and X. Jiang, "Dissecting Android Malware: Characterization and Evolution," 2012 IEEE Symposium on Security and Privacy, San Francisco, CA, pp. 95-109, May 2012.

Yerima, Suleiman Y., Sakir Sezer, and Gavin McWilliams. "Analysis of Bayesian classificationbased approaches for Android malware detection, " IET Information Security, Vol 8, pp. 25-36, Jan. 2014.

Iland, Danny, Alexander Pucher, and Timm Schauble. "Detecting android malware on network level, " University of California, Santa Barbara, Vol 12, Dec. 2011.

F. Noorbehbahani, F. Rasouli and M. Saberi, "Analysis of Machine Learning Techniques for Ransomware Detection," 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), Mashhad, Iran, 2019, pp. 128-133, Aug. 2019.

Abuthawabeh M, Mahmoud K, "Enhanced Android Malware Detection and Family Classification, using

Conversation-level Network Traffic Features, " International Arab Journal of Information Technology, Vol 17, pp. 607-614, Jul. 2020.

A. Arora, S. Garg and S. K. Peddoju, "Malware Detection Using Network Traffic Analysis in Android Based Mobile Devices," 2014 Eighth International Conference on Next Generation Mobile Apps, Services and Technologies, Oxford, pp. 66-71, Sept. 2014.

J. Li, L. Zhai, X. Zhang and D. Quan, "Research of android malware detection based on network traffic monitoring," 2014 9th IEEE Conference on Industrial Electronics and Applications, Hangzhou, pp. 17391744, Jun. 2014.

A. Dainotti, A. Pescape and K. C. Claffy, "Issues and future directions in traffic classification," in IEEE Network, vol. 26, no. 1, pp. 35-40, Jan. 2012.

H. Lashkari, A. F. A. Kadir, L. Taheri and A. A. Ghorbani, "Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification," 2018 International Carnahan Conference on Security Technology (ICCST), Montreal, QC, pp. 1-7, Oct. 2018.