DocumentCode
604372
Title
Vulnerability monitoring mechanism in Android based smartphone with correlation analysis on event-driven activities
Author
You-Joung Ham ; Won-Bin Choi ; Hyung-Woo Lee ; Jaedeok Lim ; Jeong Nyeo Kim
Author_Institution
Dept. of Comput. Eng., Hanshin Univ., Osan, South Korea
fYear
2012
fDate
29-31 Dec. 2012
Firstpage
371
Lastpage
375
Abstract
The amount of malicious mobile application targeting Android based smartphones has increase rapidly. In addition, these malicious apps are capable of downloading modules from servers which are run by malicious users, meaning that unexpected events can be activated inside of smartphones. Therefore, the attacker can control and get personal information and data stored inside of smartphone illegally. Therefore, it is necessary to monitor several event-driven activities and to detect malicious service for degrading the vulnerability on Android based smartphone. The correlation analysis mechanism is the use of statistical and systemic data to evaluate the relations between several variables. Therefore, we propose vulnerability monitoring mechanism with correlation analysis on event-driven activities in Android platform. In first, the basic activity data set (application integrity information, real-time process list, network connection and activated service list) are constructed as a DB server. And then the event data generated inbound of smartphone are aggregated and updated periodically. Based on these data, correlation analysis process is performed to detect malicious activity such as rooting attack triggered by rootkit for acquisition of administration permission. Therefore, it is useful to decrease a threat by detecting malicious event on Android based smartphones.
Keywords
Linux; correlation theory; data integrity; mobile computing; security of data; smart phones; software reliability; statistical analysis; Android based smartphones; DB server; activated service list; administration permission acquisition; application integrity information; basic activity data set; correlation analysis mechanism; event-driven activities; malicious mobile application; malicious service detection; network connection; personal data; personal information; real-time process list; rooting attack; rootkit; statistical data; systemic data; vulnerability monitoring mechanism; Android; Attack detection; Correlation analysis; Event-driven activity; Smartphone; Vulnerability;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Science and Network Technology (ICCSNT), 2012 2nd International Conference on
Conference_Location
Changchun
Print_ISBN
978-1-4673-2963-7
Type
conf
DOI
10.1109/ICCSNT.2012.6525958
Filename
6525958
Link To Document