Announcement for Downloading full text filePlease respect the Copyright Act.
All digital full text dissertation and theses from this website are authorized the copyright owners. These copyrighted full-text dissertation and theses can be only used for academic, research and non-commercial purposes. Users of this website can search, read, and print for personal usage. In respect of the Copyright Act of the Republic of China, please do not reproduce, distribute, change, or edit the content of these dissertations and theses without any permission. Please do not create any work based upon a pre-existing work by reproduction, Adaptation, Distribution or other means.
URN etd-0830112-172257 Statistics This thesis had been viewed 2530 times. Download 2109 times. Author Chien-Hsing Sun Author's Email Address No Public. Department Information Management Year 2011 Semester 2 Degree Master Type of Document Master's Thesis Language zh-TW.Big5 Chinese Page Count 69 Title A Behavior-Based Malware Detection Study on the Android Devices Keyword smart phones information security detecting Trojan malware malware Trojan information security detecting smart phones Abstract Thanks to the vigorous development on mobile broadband in recent years, smart phones have gradually replaced traditional cell phones and become the main stream in cell phone market. Due to abounding private information can be stored up inside smart phones and according to the cell phone malware reports from some information security companies, Trojan can stole private information and has become the most infamous malware among malicious software. This research will focus on information and communication issues from the smart mobile device.
This research will aim at the abnormal behavior traits that the malware has to link to the external network and transmit the stolen data to some specific servers, submit a method to detect the malware and actually put up an environment for wireless network monitoring. Through the experiment, this research will take the Android smart phone as an example to compare the unusual characteristic in network behavior between the malware and the normal software and to test and verify that this method can detect the abnormal network behavior from the infected cell phones. Moreover, this experiment will prove this examining method will not only detect the known malware network behavior, but also detect the unknown malware network behavior.
In the present day, the researches on detecting cell phone’s malware behavior still need to limit on some specific working platforms and also the known samples. The greatest contribution of this detecting method from the research is that it can initially affirm the abnormal behavior from the mobile device that has installed different working platforms. Because of free from setting up a complicated environment, this detecting method can be provided to the general users to do the self-detecting job. Also, this method can be a reference and provided to the related enterprises to strengthen information security detecting on smart phones or mobile device.
Advisor Committee Patrick S. Chen - advisor
Files Date of Defense 2012-07-04 Date of Submission 2012-08-30