TY - JOUR
T1 - Network activity monitoring against malware in android operating system
AU - Acosta-Guzmãn, Luis M.
AU - Aguilar-Torres, Gualberto
AU - Gallegos-Garcia, Gina
N1 - Publisher Copyright:
Copyright © 2016 Institute of Advanced Engineering and Science. All rights reserved.
PY - 2016/2
Y1 - 2016/2
N2 - Google's Android is the most used Operating System in mobile devices but as its popularity has increased hackers have taken advantage of the momentum to plague Google Play (Android's Application Store) with multipurpose Malware that is capable of stealing private information and give the hacker remote control of smartphone's features in the worst cases. This work presents an innovative methodology that helps in the process of malware detection for Android Operating System, which addresses aforementioned problem from a different perspective that even popular Anti- Malware software has left aside. It is based on the analysis of a common characteristic to all different kinds of malware: the need of network communications, so the victim device can interact with the attacker. It is important to highlight that in order to improve the security level in Android; our methodology should be considered in the process of malware detection. As main characteristic, it does not need to install additional kernel modules or to root the Android device. And finally as additional characteristic, it is as simple as can be considered for non-experienced users.
AB - Google's Android is the most used Operating System in mobile devices but as its popularity has increased hackers have taken advantage of the momentum to plague Google Play (Android's Application Store) with multipurpose Malware that is capable of stealing private information and give the hacker remote control of smartphone's features in the worst cases. This work presents an innovative methodology that helps in the process of malware detection for Android Operating System, which addresses aforementioned problem from a different perspective that even popular Anti- Malware software has left aside. It is based on the analysis of a common characteristic to all different kinds of malware: the need of network communications, so the victim device can interact with the attacker. It is important to highlight that in order to improve the security level in Android; our methodology should be considered in the process of malware detection. As main characteristic, it does not need to install additional kernel modules or to root the Android device. And finally as additional characteristic, it is as simple as can be considered for non-experienced users.
KW - Android
KW - Malware
KW - Methodology
KW - Network Activity Monitor
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84960093954&partnerID=8YFLogxK
U2 - 10.11591/ijece.v6i1.9012
DO - 10.11591/ijece.v6i1.9012
M3 - Artículo
SN - 2088-8708
VL - 6
SP - 249
EP - 256
JO - International Journal of Electrical and Computer Engineering
JF - International Journal of Electrical and Computer Engineering
IS - 1
ER -