Deakin University
Browse

Detecting SMS-based control commands in a Botnet from infected android devices

conference contribution
posted on 2012-01-01, 00:00 authored by A Nguyen, Lei Pan
An increasing number of Android devices are being infected and at risk of becoming part of a botnet. Among all types of botnets, control and cornmand based botnets are very popular. In this paper we introduce an effective and efficient method to ddect SMS-based control commands ftvm infected Android devices. Specifically, we rely on the important radio activities recorded in Android log files. These radio activities are currently overlooked by researchers. We show the effectiveness of our rnethod by using the examples frorn published literature. Our method requires much less user knowledge but is more generic than traditional approaches.

History

Location

Melbourne, Vic.

Language

eng

Publication classification

E1 Full written paper - refereed

Copyright notice

2012, Deakin University

Editor/Contributor(s)

M Warren

Pagination

23 - 27

Start date

2012-11-07

ISBN-13

9780987229823

Title of proceedings

ATIS 2012 : Proceedings of the 3rd Applications and Technologies in Information Security Workshop

Event

Applications and Technologies in Information Security. Workshop (3rd : 2012 : Melbourne, Vic.)

Publisher

School of Information Systems, Deakin University

Place of publication

Melbourne, Vic.

Usage metrics

    Research Publications

    Categories

    No categories selected

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC