Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.6.1215

DDoS Attack Application Detection Method with Android Logging System  

Choi, Seul-Ki (SAA Lab., Department of Information Security Engineering,Soonchunhyang University)
Hong, Min (Department of Computer Software Engineering, Soonchunhyang University)
Kwak, Jin (Department of Information Security Engineering, Soonchunhyang University)
Abstract
Various research was done to protect user's private data from malicious application which expose user's private data and abuse exposed data. However, a new type of malicious application were appeared. And these malicious applications use a smart phone as a new tools to perform secondary attack. Therefore, in this paper, we propose a method to detect the DDoS attack application installed inside the mobile device using the Android logging system.
Keywords
Android; DDoS; Detection; Log analysis;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 PROLEXIC, "Prolexic quarterly global ddoS attack report Q1 2014," Apr. 2014.
2 Seung-hwan Ju, Hee-suk Seo and Jin Kwak, "Study on analysis methodology for android applications," Journal of Internet Technology, vol. 14, no. 5, pp. 851-857, Sep. 2013.
3 Seung-hwan Ju, Hee-suk Seo and Jin Kwak, "Study on analysis application smartwork," Lecture Notes in Electrical Engineering, vol. 214, pp. 31-37, Dec. 2012.
4 Ilyoung Hong and Sangjin Lee, "Research on efficient live evidence analysis system based on user activity using android logging system," Journal of The Korea Institute of information Security & Cryptology, vol. 22, no. 1, pp. 67-80, Feb. 2012.   과학기술학회마을
5 W. Enck, D. Octeau, P. McDaniel and S. Chauduri, "A study of android security," In Proc. of the 20th USENIX Security Symposium, Aug. 2011.
6 Jun-Sub Kim, Jae-Byoung Yoon, Kyung-Gi Kim, Min-Soo Kim, Jin Kwak and Bong Gyou Lee, "Vulnerability analysis method on android application," Proceeding of CISC-W'12, pp. 161-164, Dec. 2012.
7 Yujong Jang and Jin Kwak, "Android application verification method using security testbed," Proceeding of CISC-W'12, pp. 161-164, Dec. 2012.
8 Google, "Android logging system," http://developer.android.com/tools/debugging/debugging-log.html
9 Google, "Android debug bridge," http://developer.android.com/tools/help/adb.html
10 Google, "Application fundamentals," http://developer.android.com/guide/components/fundamentals.html