Detecting SMS-based control commands in a Botnet from infected android devices


Autoria(s): Nguyen, Anh; Pan, Lei
Contribuinte(s)

Warren, Matthew

Data(s)

01/01/2012

Resumo

An increasing number of Android devices are being infected and at risk of becoming part of a botnet. Among all types of botnets, control and cornmand based botnets are very popular. In this paper we introduce an effective and efficient method to ddect SMS-based control commands ftvm infected Android devices. Specifically, we rely on the important radio activities recorded in Android log files. These radio activities are currently overlooked by researchers. We show the effectiveness of our rnethod by using the examples frorn published literature. Our method requires much less user knowledge but is more generic than traditional approaches.

Identificador

http://hdl.handle.net/10536/DRO/DU:30051357

Idioma(s)

eng

Publicador

School of Information Systems, Deakin University

Relação

http://dro.deakin.edu.au/eserv/DU:30051357/evid-atisconfandpeerrvwgnrl-2012.pdf

http://dro.deakin.edu.au/eserv/DU:30051357/nguyen-detectingsmsbased-2012.pdf

http://mjwarrenresearch.files.wordpress.com/2012/11/atis12-proceedings1.pdf

Direitos

2012, Deakin University

Palavras-Chave #botnet #logging #android #digital forensics
Tipo

Conference Paper