메뉴 건너뛰기




Volumn 38, Issue 1, 2012, Pages 161-190

"Andromaly": A behavioral malware detection framework for android devices

Author keywords

Android; Machine learning; Malware; Mobile devices; Security

Indexed keywords

ANDROID; ANOMALY DETECTOR; ANOMALY-DETECTION ALGORITHMS; EMPIRICAL RESULTS; FEATURE SELECTION METHODS; HOST-BASED; MACHINE-LEARNING; MALWARE DETECTION; MALWARES; SECURITY;

EID: 84856225193     PISSN: 09259902     EISSN: 15737675     Source Type: Journal    
DOI: 10.1007/s10844-010-0148-x     Document Type: Article
Times cited : (612)

References (59)
  • 3
    • 63049091681 scopus 로고    scopus 로고
    • From desktop to mobile: Examining the security experience
    • 10.1016/j.cose.2008.11.001
    • RA Botha SM Furnell NL Clarke 2009 From desktop to mobile: Examining the security experience Computer & Security 28 130 137 10.1016/j.cose.2008.11. 001
    • (2009) Computer & Security , vol.28 , pp. 130-137
    • Botha, R.A.1    Furnell, S.M.2    Clarke, N.L.3
  • 4
    • 51449120796 scopus 로고    scopus 로고
    • Mobile device profiling and intrusion detection using smart batteries
    • Buennemeyer, T. K.; et al. (2008). Mobile device profiling and intrusion detection using smart batteries. In International conference on system sciences (pp. 296-296).
    • (2008) International Conference on System Sciences , pp. 296-296
    • Buennemeyer T., .K.1
  • 5
    • 68049121093 scopus 로고    scopus 로고
    • Anomaly detection: A survey
    • 10.1145/1541880.1541882
    • V Chandola A Banerjee V Kumar 2009 Anomaly detection: A survey ACM Computing Surveys 41 3 1 58 10.1145/1541880.1541882
    • (2009) ACM Computing Surveys , vol.41 , Issue.3 , pp. 1-58
    • Chandola, V.1    Banerjee, A.2    Kumar, V.3
  • 8
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming!
    • DOI 10.1109/MPRV.2004.21
    • C Dagon T Martin T Starner 2004 Mobile phones as computing devices the viruses are coming Pervasive Computing 3 11 15 10.1109/MPRV.2004.21 (Pubitemid 40010893)
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.4 , pp. 11-15
    • Dagon, D.1    Martin, T.2    Starner, T.3
  • 9
    • 0031269184 scopus 로고    scopus 로고
    • On the optimality of the simple bayesian classifier under zero-One loss
    • P Domingos M Pazzani 1997 On the optimality of simple Bayesian classifier under zero-one loss Machine Learning 29 103 130 10.1023/A:1007413511361 0892.68076 (Pubitemid 127510035)
    • (1997) Machine Learning , vol.29 , Issue.2-3 , pp. 103-130
    • Domingos, P.1    Pazzani, M.2
  • 11
    • 33750962703 scopus 로고    scopus 로고
    • Mobile malware - new avenues
    • DOI 10.1016/S1353-4858(06)70450-0, PII S1353485806704500
    • D Emm 2006 Mobile malware - new avenues Network Security 2006 11 4 6 10.1016/S1353-4858(06)70450-0 (Pubitemid 44739351)
    • (2006) Network Security , vol.2006 , Issue.11 , pp. 4-6
    • Emm, D.1
  • 15
    • 57849130705 scopus 로고    scopus 로고
    • Anomaly-based network intrusion detection: Techniques, systems and challenges
    • 10.1016/j.cose.2008.08.003
    • P Garcia-Teodoro J Diaz-Verdejo G Macia-Fernandez E Vazquez 2009 Anomaly-based network intrusion detection: Techniques, systems and challenges Computers & Security 28 1-2 18 28 10.1016/j.cose.2008.08.003
    • (2009) Computers & Security , vol.28 , Issue.12 , pp. 18-28
    • Garcia-Teodoro, P.1    Diaz-Verdejo, J.2    MacIa-Fernandez, G.3    Vazquez, E.4
  • 16
    • 0033569406 scopus 로고    scopus 로고
    • Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring
    • 10.1126/science.286.5439.531
    • T Golub, et al. 1999 Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring Science 286 531 537 10.1126/science.286.5439.531
    • (1999) Science , vol.286 , pp. 531-537
    • Golub, T.1
  • 19
    • 34247497767 scopus 로고    scopus 로고
    • Smart-phone attacks and defenses
    • Guo, C.; Wang, H. J.; & Zhu, W. (2004). Smart-phone attacks and defenses. In HotNets III.
    • (2004) HotNets III
    • Guo, C.1    Wang, H.J.2    Zhu, W.3
  • 20
    • 57849163559 scopus 로고    scopus 로고
    • Keystroke dynamics-based authentication for mobile devices
    • 10.1016/j.cose.2008.10.002
    • SS Hwang S Cho S Park 2009 Keystroke dynamics-based authentication for mobile devices Computer & Security 28 85 93 10.1016/j.cose.2008.10.002
    • (2009) Computer & Security , vol.28 , pp. 85-93
    • Hwang, S.S.1    Cho, S.2    Park, S.3
  • 22
    • 48349134267 scopus 로고    scopus 로고
    • Behavioral detection of malware: From a survey towards an established taxonomy
    • 10.1007/s11416-008-0086-0
    • G Jacob H Debar E Filiol 2008 Behavioral detection of malware: From a survey towards an established taxonomy Journal in Computer Virology 4 251 266 10.1007/s11416-008-0086-0
    • (2008) Journal in Computer Virology , vol.4 , pp. 251-266
    • Jacob, G.1    Debar, H.2    Filiol, E.3
  • 28
    • 18144370814 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers?
    • N Leavitt 2005 Mobile phones: The next frontier for hackers? Computer 38 4 20 23 10.1109/MC.2005.134 (Pubitemid 40608419)
    • (2005) Computer , vol.38 , Issue.4 , pp. 20-23
    • Leavitt, N.1
  • 31
    • 0036093229 scopus 로고    scopus 로고
    • Toward cost-sensitive modeling for intrusion detection and response
    • W Lee W Fan M Miller S Stolfo E Zadok 2002 Toward cost-sensitive modeling for intrusion detection and response Journal of Computer Security 10 1-2 5 22 (Pubitemid 34531411)
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.J.4    Zadok, E.5
  • 32
    • 58549090885 scopus 로고    scopus 로고
    • Improving malware detection by applying multi-inducer ensemble
    • 10.1016/j.csda.2008.10.015 2657107
    • E Menahem A Shabtai L Rokach Y Elovici 2008 Improving malware detection by applying multi-inducer ensemble Computational Statistics and Data Analysis 53 4 1483 1494 10.1016/j.csda.2008.10.015 2657107
    • (2008) Computational Statistics and Data Analysis , vol.53 , Issue.4 , pp. 1483-1494
    • Menahem, E.1    Shabtai, A.2    Rokach, L.3    Elovici, Y.4
  • 37
    • 42749086128 scopus 로고    scopus 로고
    • Detection of unknown computer worms based on behavioral classification of the host
    • 10.1016/j.csda.2008.01.028 05565036 2432480
    • R Moskovitch Y Elovici L Rokach 2008 Detection of unknown computer worms based on behavioral classification of the host Computational Statistics and Data Analysis 52 9 4544 4566 10.1016/j.csda.2008.01.028 05565036 2432480
    • (2008) Computational Statistics and Data Analysis , vol.52 , Issue.9 , pp. 4544-4566
    • Moskovitch, R.1    Elovici, Y.2    Rokach, L.3
  • 39
    • 33644854066 scopus 로고    scopus 로고
    • Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
    • Nash, D. C.; et al. (2005). Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices. In Pervasive computing and communications workshops.
    • (2005) Pervasive Computing and Communications Workshops
    • Nash, D.C.1
  • 43
    • 10644275203 scopus 로고    scopus 로고
    • Embedded devices next on the virus target list
    • 10.1049/ess:20040612
    • M Piercy 2004 Embedded devices next on the virus target list IEEE Electronics Systems and Software 2 42 43 10.1049/ess:20040612
    • (2004) IEEE Electronics Systems and Software , vol.2 , pp. 42-43
    • Piercy, M.1
  • 47
    • 0031234827 scopus 로고    scopus 로고
    • IDAMN: An intrusion detection architecture for mobile networks
    • PII S0733871697058472
    • D Samfat R Molva 1997 IDAMN: An intrusion detection architecture for mobile networks IEEE Journal on Selected Areas in Communications 15 7 1373 1380 10.1109/49.622919 (Pubitemid 127566448)
    • (1997) IEEE Journal on Selected Areas in Communications , vol.15 , Issue.7 , pp. 1373-1380
    • Samfat, D.1    Molva, R.2
  • 50
    • 84856213457 scopus 로고    scopus 로고
    • Detecting malicious applications on android by applying machine learning classifiers to static features (Poster)
    • Presented in the Honolulu, Hawaii
    • Shabtai, A.; Fledel, Y.; & Elovici, Y. (2009a). Detecting malicious applications on android by applying machine learning classifiers to static features (Poster). Presented in the 25th annual computer security applications conference (ACSAC). Honolulu, Hawaii.
    • (2009) 25th Annual Computer Security Applications Conference (ACSAC)
    • Shabtai, A.1    Fledel, Y.2    Elovici, Y.3
  • 52
    • 65749099969 scopus 로고    scopus 로고
    • Detection of malicious code by applying machine learning classifiers on static features: A state-of-The-art survey
    • 10.1016/j.istr.2009.03.003
    • A Shabtai R Moskovitch Y Elovici C Glezer 2009 Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey Information Security Technical Report 14 1 1 34 10.1016/j.istr.2009.03.003
    • (2009) Information Security Technical Report , vol.14 , Issue.1 , pp. 1-34
    • Shabtai, A.1    Moskovitch, R.2    Elovici, Y.3    Glezer, C.4
  • 54
    • 77953137615 scopus 로고    scopus 로고
    • Intrusion detection on mobile devices using the knowledge based temporal-abstraction method
    • 10.1016/j.jss.2010.03.046
    • A Shabtai U Kanonov Y Elovici 2010 Intrusion detection on mobile devices using the knowledge based temporal-abstraction method Journal of Systems and Software 83 8 1524 1537 10.1016/j.jss.2010.03.046
    • (2010) Journal of Systems and Software , vol.83 , Issue.8 , pp. 1524-1537
    • Shabtai, A.1    Kanonov, U.2    Elovici, Y.3
  • 56
    • 84856043672 scopus 로고
    • The mathematical theory of communication
    • 1154.94303 26286
    • CE Shannon 1948 The mathematical theory of communication The Bell system Technical Journal 27 3 379 423 1154.94303 26286
    • (1948) The Bell System Technical Journal , vol.27 , Issue.3 , pp. 379-423
    • Shannon, C.E.1
  • 57
    • 42549166924 scopus 로고    scopus 로고
    • Security aspects of mobile phone virus: A critical survey
    • DOI 10.1108/02635570810868344
    • DH Shih B Lin HS Chiang MH Shih 2008 Security aspects of mobile phone virus: A critical survey Industrial Management & Data Systems 108 4 478 494 10.1108/02635570810868344 (Pubitemid 351590943)
    • (2008) Industrial Management and Data Systems , vol.108 , Issue.4 , pp. 478-494
    • Shih, D.-H.1    Lin, B.2    Chiang, H.-S.3    Shih, M.-H.4
  • 58
    • 26444504890 scopus 로고    scopus 로고
    • A mobile phone malicious software detection model with behavior checker
    • Web and Communication Technologies and Internet-Related Social Issues - HSI 2005: 3rd International Conference on Human.Society@Internet. Proceedings
    • TS Yap HT Ewe 2005 A mobile phone malicious software detection model with behavior checker Lecture Notes in Computer Science 3597 57 65 10.1007/115277257 (Pubitemid 41435937)
    • (2005) Lecture Notes in Computer Science , vol.3597 , pp. 57-65
    • Yap, T.S.1    Ewe, H.T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.