• DocumentCode
    604372
  • Title

    Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities

  • Author

    You-Joung Ham ; Won-Bin Choi ; Hyung-Woo Lee ; Jaedeok Lim ; Jeong Nyeo Kim

  • Author_Institution
    Dept. of Comput. Eng., Hanshin Univ., Osan, South Korea
  • fYear
    2012
  • fDate
    29-31 Dec. 2012
  • Firstpage
    371
  • Lastpage
    375
  • Abstract
    The amount of malicious mobile application targeting Android based smartphones has increase rapidly. In addition, these malicious apps are capable of downloading modules from servers which are run by malicious users, meaning that unexpected events can be activated inside of smartphones. Therefore, the attacker can control and get personal information and data stored inside of smartphone illegally. Therefore, it is necessary to monitor several event-driven activities and to detect malicious service for degrading the vulnerability on Android based smartphone. The correlation analysis mechanism is the use of statistical and systemic data to evaluate the relations between several variables. Therefore, we propose vulnerability monitoring mechanism with correlation analysis on event-driven activities in Android platform. In first, the basic activity data set (application integrity information, real-time process list, network connection and activated service list) are constructed as a DB server. And then the event data generated inbound of smartphone are aggregated and updated periodically. Based on these data, correlation analysis process is performed to detect malicious activity such as rooting attack triggered by rootkit for acquisition of administration permission. Therefore, it is useful to decrease a threat by detecting malicious event on Android based smartphones.
  • Keywords
    Linux; correlation theory; data integrity; mobile computing; security of data; smart phones; software reliability; statistical analysis; Android based smartphones; DB server; activated service list; administration permission acquisition; application integrity information; basic activity data set; correlation analysis mechanism; event-driven activities; malicious mobile application; malicious service detection; network connection; personal data; personal information; real-time process list; rooting attack; rootkit; statistical data; systemic data; vulnerability monitoring mechanism; Android; Attack detection; Correlation analysis; Event-driven activity; Smartphone; Vulnerability;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and Network Technology (ICCSNT), 2012 2nd International Conference on
  • Conference_Location
    Changchun
  • Print_ISBN
    978-1-4673-2963-7
  • Type

    conf

  • DOI
    10.1109/ICCSNT.2012.6525958
  • Filename
    6525958