Suggestion for Malware Detection Agent Considering Network Environment
Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1340180Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 736
 Mobile Cyber Threats, Kaspersky Lab & INTERPOL Joint Report, http://media.kaspersky.com/pdf/Kaspersky-Lab-KSN-Report-mobile-cyberthreats-web.pdf, 2014.
 Xiaoming Kou, Qiaoyan Wen, "Intrusion detection model based on android,” Broadband Network and Multimedia Technology(IC-BNMT), 2011.
 Deepak Venugopala, Guoning Hub, "Efficient signature based malware detection on mobile devices,” Mobile Information Systems, 2008.
 Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park, "Behavioral Detection of Malware on Mobile Handsets", MobiSys '08 Proceedings of the 6th international conference on Mobile systems, 2008.
 Jerry Cheng, Starsky H. Y. Wong, Hao Yang, Songwu Lu, "SmartSiren Virus Detection and Alert for Smartphones", MobiSys '07 Proceedings of the 5th international conference on Mobile systems, 2008.
 Iker Burguera, Urko Zurutuza, Simin Nadjm-Tehrani, "Crowdroid Behavior-Based Malware Detection System", SPSM '11 Proceedings of the 1st ACM workshop on Security and privacy in smartphones, 2011.
 Adam P. Fuchs, Avik Chaudhuri, and Jeffrey S. Foster, "Scan -Droid Automated Security Certification of Android Applications", SPSM '11 Proceedings of the 1st ACM workshop on Security and privacy in smartphones, 2011.
 William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, "Anmol N. Sheth, TaintDroid An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones", OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation, 2010.
 W. L. Cholter, et al., "IBAN: Intrusion Blocker based on Active Networks" Proceedings of the DARPA Active Networks Conference and Exposition, May, 2002.