Android botnets: What urls are telling us

AF Abdul Kadir, N Stakhanova, AA Ghorbani - Network and System …, 2015 - Springer
Network and System Security: 9th International Conference, NSS 2015, New York …, 2015Springer
Botnets have traditionally been seen as a threat to personal computers; however, the recent
shift to mobile platforms resulted in a wave of new botnets. Due to its popularity, Android
mobile Operating System became the most targeted platform. In spite of rising numbers,
there is a significant gap in understanding the nature of mobile botnets and their
communication characteristics. In this paper, we address this gap and provide a deep
analysis of Command and Control (C&C) and built-in URLs of Android botnets detected …
Abstract
Botnets have traditionally been seen as a threat to personal computers; however, the recent shift to mobile platforms resulted in a wave of new botnets. Due to its popularity, Android mobile Operating System became the most targeted platform. In spite of rising numbers, there is a significant gap in understanding the nature of mobile botnets and their communication characteristics. In this paper, we address this gap and provide a deep analysis of Command and Control (C&C) and built-in URLs of Android botnets detected since the first appearance of the Android platform. By combining both static and dynamic analyses with visualization, we uncover the relationships between the majority of the analyzed botnet families and offer an insight into each malicious infrastructure. As a part of this study we compile and offer to the research community a dataset containing 1929 samples representing 14 Android botnet families.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果

Google学术搜索按钮

example.edu/paper.pdf
查找
获取 PDF 文件
引用
References