Detecting SMS-based control commands in a Botnet from infected android devices
Contribuinte(s) |
Warren, Matthew |
---|---|
Data(s) |
01/01/2012
|
Resumo |
An increasing number of Android devices are being infected and at risk of becoming part of a botnet. Among all types of botnets, control and cornmand based botnets are very popular. In this paper we introduce an effective and efficient method to ddect SMS-based control commands ftvm infected Android devices. Specifically, we rely on the important radio activities recorded in Android log files. These radio activities are currently overlooked by researchers. We show the effectiveness of our rnethod by using the examples frorn published literature. Our method requires much less user knowledge but is more generic than traditional approaches. |
Identificador | |
Idioma(s) |
eng |
Publicador |
School of Information Systems, Deakin University |
Relação |
http://dro.deakin.edu.au/eserv/DU:30051357/evid-atisconfandpeerrvwgnrl-2012.pdf http://dro.deakin.edu.au/eserv/DU:30051357/nguyen-detectingsmsbased-2012.pdf http://mjwarrenresearch.files.wordpress.com/2012/11/atis12-proceedings1.pdf |
Direitos |
2012, Deakin University |
Palavras-Chave | #botnet #logging #android #digital forensics |
Tipo |
Conference Paper |