Title :
Analysis of Mobile P2P Malware Detection Framework through Cabir & Commwarrior Families
Author :
Adeel, Muhammad ; Tokarchuk, Laurissa N.
Author_Institution :
Sch. of Electron. Eng. & Comput. Sci., Queen Mary Univ. of London, London, UK
Abstract :
Mobile Peer-to-Peer (P2P) malware has emerged as one of the major challenges in mobile network security in recent years. Around four hundred mobile viruses, worms, trojans and spy ware, together with approximately one thousand of their variants have been discovered to-date. So far no classification of such mobile P2P security threats exists. There is no well known simulation environment to model mobile P2P network characteristics and provide a platform for the analysis of the propagation of different types of mobile malware. Therefore, our research provides a classification of mobile malware based on the behaviour of a node during infection and develops a platform to analyse malware propagation. It proposes and evaluates a novel behaviour-based approach, using AI, for the detection of various malware families. Unlike existing approaches, our approach focuses on identifying and classifying malware families rather than detecting individual malware and their variants. Adaptive detection of currently known and previously unknown mobile malware on designated mobile nodes through a deployed detection framework aided by AI classifiers enables successful detection. Although we have classified around 30% of the existing mobile P2P malware into 13 distinct malware families based on their behaviour during infection, this paper focuses on two, Cabir & Commwarrior, in order to analyse the proposed detection framework.
Keywords :
computer network security; computer viruses; invasive software; mobile agents; mobile computing; pattern classification; peer-to-peer computing; AI classifier; Cabir families; Commwarrior families; behaviour-based approach; malware family classification; mobile P2P malware detection framework; mobile malware classification; mobile network security; mobile node; mobile spyware; mobile trojan; mobile virus; mobile worm; Analytical models; Batteries; Bluetooth; Grippers; Malware; Mobile communication; Mobile computing; MPeersim; Malware Classification; Malware Detection; Malware Families; Malware Propagation; Mobile Agents; Mobile P2P Networks;
Conference_Titel :
Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on
Conference_Location :
Boston, MA
Print_ISBN :
978-1-4577-1931-8
DOI :
10.1109/PASSAT/SocialCom.2011.243