A New Logging-based IP Traceback Approach using
Data Mining Techniques


Ho-Seok Kang and Sung-Ryul Kim*


Internet & Multimedia Engineering, Konkuk University
Seoul, Republic of Korea
hsriverv@gmail.com, kimsr@konuk.ac.kr


Abstract

Smartphones contain security-sensitive information of a user such as contacts, SMS, photos, and GPS information. Because smartphones are always turned on and ready to connect to the Internet, that sensitive information is in danger of leakage. Various kinds of malware are more and more attacking smartphones, especially Android phones. We propose a scheme that protects Android phones against one of them, called LeNa. LeNa infects rooted Android phones and periodically leaks sensitive information of the phone. LeNa also dominates the system and makes the phone a zombie which can perform Distributed Denial of Service (DDoS) attack. The proposed scheme checks whether a process is allowed to execute a requesting operation even after the process have acquired the root privilege. This scheme can also protect smartphones from malware targeted for rooted phones. 
 

Keywords: LeNa, malware, rooting, Android, root privilege

*: Corresponding author: Sung-Ryul Kim
120 Neungdong-ro, Gwanjin-gu, Konkuk University, Seoul 143-701, Republic of Korea,
Tel: +82-(0)24504134, Web: http://aislab.konkuk.ac.kr

 

Journal of Internet Services and Information Security (JISIS), 3(3/4): 72-80, November  2013 [pdf]