Skip to main content

A Real-time Android Malware Detection System Based on Network Traffic Analysis

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2015)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9530))

Abstract

Mobile devices are everywhere nowadays, such as mobile phone, mobile tablets. Meanwhile, various malwares on mobile terminals are emerging one after another, especially on the open-source Android system. Traditional detection schemes are based on static method or dynamic method. In recent years, industry and academia have paid close attention to the detection mechanisms using network behaviors to identify the malware. In this paper, we design a real-time Android malware detection system based on network traffic analysis, which includes a training model and a real-time detection model. By training over the malware traffic using the training model, we find that 76.33 % DNS queries and 45.39 % HTTP requests are all malicious. We set up a real-time scanning service based on the malicious URLs that are captured in the training model, which is the core of the real-time detection model. By performing malware detection using the established real-time detection model, we show that the detection rate using the real-time scanning service is much higher than the integrated service. Meanwhile, the detection rate will further improve by integrating more third-party scanning services into our system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yajin, Z., Xuxian, J.: Dissecting android malware: characterization and evolution. In: 2012 IEEE Symposium on Security and Privacy (SP), pp. 95–109. IEEE (2012)

    Google Scholar 

  2. Becher, M., Freiling, F.C., Hoffmann, J., Holz T., Uellenbeck, S., Wolf, C.: Mobile security catching up? revealing the nuts and bolts of the security of mobile devices. In: 2011 IEEE Symposium on Security and Privacy (SP), pp. 96–111. IEEE (2011)

    Google Scholar 

  3. Daniel, A., Michael, S., Malte, H., Hugo, G., Konrad, R., Cert, S.: Effective and Explainable Detection of Android Malware in Your Pocket, DREBIN (2014)

    Google Scholar 

  4. Fang, Z., Han, W., Li, Y.: Permission based android security: issues and countermeasures. Comput. Secur. 43, 205–218 (2014)

    Article  Google Scholar 

  5. Jesus, F.: Smali: An Assembler/Disassembler For Androids Dex Format, Google Project Hosting (2013). http://code.google.com/p/smali

  6. Lok-Kwong, Y., Yin, H.: DroidScope: seamlessly reconstructing the OS and Dalvik semantic views for dynamic android malware analysis. In: Usenix Security Symposium, pp. 569–584 (2012)

    Google Scholar 

  7. Falaki, H., Lymberopoulos, D., Mahajan, R., Kandula, S., Estrin, D.: A first look at traffic on smartphones. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, pp. 281–287. ACM, November 2010

    Google Scholar 

  8. Cheng, J., Wong, S.H.Y., Yang, H., Lu S.: Smartsiren: virus detection and alert for smartphones. In: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services, pp. 258–271. ACM (2007)

    Google Scholar 

  9. Tenenboim-Chekina, L., Barad, O., Shabtai, A., Mimran, D., Shapira, B., Elovici, Y.: Detecting application update attack on mobile devices through network features. In: INFOCOM (2013)

    Google Scholar 

  10. Shabtai, A., Tenenboim-Chekina, L., Mimran, D., Rokach, L., Shapira, B., Elovici, Y.: Mobile malware detection through analysis of deviations in application network behavior. Comput. Secur. 43, 1–18 (2014)

    Article  Google Scholar 

  11. Jin, R., Wang, B.: Malware detection for mobile devices using software-defined networking. In: 2013 Second GENI Research and Educational Experiment Workshop (GREE), pp. 81–88. IEEE (2013)

    Google Scholar 

  12. Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou, N., Dagon, D.: Detecting malware domains at the upper DNS hierarchy. In: USENIX Security Symposium (2011)

    Google Scholar 

  13. Bilge, L., Kirda, E., Kruegel, C., Balduzzi, M., Antipolis, S.: EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis, NDSS (2011)

    Google Scholar 

  14. Charles, L., Manos, A., Bradley, R., Patrick, T., Wenke, L.: The core of the matter: analyzing malicious traffic in cellular carriers. In: NDSS (2013)

    Google Scholar 

  15. Kanei, F., Yoshioka, K., Matsumoto, T.: Observing DNS Communication of Android Malware using Sandbox Analysis, Ieice Technical report Information and Communication System Security, 112 (2013)

    Google Scholar 

  16. Mockapetris, P.: Domain Names-Concepts andFacilities. RFC 1034. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP. RFC 2560 (1987)

    Google Scholar 

  17. Mockapetris, P.: Domain names-implementation and specification, request for comments 1035. Usc Inf. Sci. Inst. Mar. 19(6), 697 (1987)

    Google Scholar 

  18. URLVoid. https://www.urlvoid.com

  19. VirusTotal. https://www.virustotal.com

  20. Micro, T.: http://global.sitesafety.trendmicro.com

  21. Schiavoni, S., Maggi, F., Cavallaro, L., Zanero, S.: Phoenix: DGA-based botnet tracking and intelligence. In: Dietrich, S. (ed.) DIMVA 2014. LNCS, vol. 8550, pp. 192–211. Springer, Heidelberg (2014)

    Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China under Grants No.61472164 and No.61203105,the Natural Science Foundation of Shandong Province under Grants No.ZR2014JL042 and No.ZR2012FM010.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhenxiang Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Han, H., Chen, Z., Yan, Q., Peng, L., Zhang, L. (2015). A Real-time Android Malware Detection System Based on Network Traffic Analysis. In: Wang, G., Zomaya, A., Martinez, G., Li, K. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2015. Lecture Notes in Computer Science(), vol 9530. Springer, Cham. https://doi.org/10.1007/978-3-319-27137-8_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-27137-8_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-27136-1

  • Online ISBN: 978-3-319-27137-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics