2015
DOI: 10.1016/j.ins.2015.04.035
|View full text |Cite
|
Sign up to set email alerts
|

Simple and effective method for detecting abnormal internet behaviors of mobile devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(11 citation statements)
references
References 36 publications
0
11
0
Order By: Relevance
“…Unlike the work mentioned above, our proposed system runs at the network level directly without necessarily having access to the mobile devices. We notice that the most similar work was carried out by Chen et al [15]. Chen et al 's method [15] was also implemented at the network level and identified abnormal network behaviors by conducting 3-step check action, including (1) identifying HTTP POST and HTTP GET packages, (2) checking whether the device was exposing unique device identifiers such as IMEI and IMSI, and (3) determining the legitimacy of the remote server by querying the domain name server.…”
Section: Related Workmentioning
confidence: 69%
See 2 more Smart Citations
“…Unlike the work mentioned above, our proposed system runs at the network level directly without necessarily having access to the mobile devices. We notice that the most similar work was carried out by Chen et al [15]. Chen et al 's method [15] was also implemented at the network level and identified abnormal network behaviors by conducting 3-step check action, including (1) identifying HTTP POST and HTTP GET packages, (2) checking whether the device was exposing unique device identifiers such as IMEI and IMSI, and (3) determining the legitimacy of the remote server by querying the domain name server.…”
Section: Related Workmentioning
confidence: 69%
“…So their method can only be applied to HTTP traffic. Contrary to the work of Chen et al [15], we use the combination of signature matching and constrained mobile network traffic clustering for app identification and, thus, our method is suitable for both plaintext and ciphertext traffic such as HTTPS. The work introduced in [6] is also intended to detect Android malware from network traffic.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The signature based detection is a widely used method in static analysis. According to this method, the binary executables are transformed to represent hashes which are matched with a database of known malware samples [ 13] [ 14] [15] [ 16] [ 17], but it shows following weaknesses. The signature method requires continuous updates of signature and high maintenance cost.…”
Section: Introductionmentioning
confidence: 99%
“…User clicks behavior in sponsored search is analyzed in [40] to help advertisers raise the quality of their ads. In trust related research, a framework for automatic analysis of malware behavior using machine learning is introduced in [67], and the abnormal internet behaviors are analyzed to detect mobile malware in [17]. Behavior modeling and behavior pattern analysis are addressed for web services in the bootstrapping approach presented in [86].…”
Section: Introductionmentioning
confidence: 99%