Artigo Revisado por pares

Analysis of malware application based on massive network traffic

2016; Institute of Electrical and Electronics Engineers; Volume: 13; Issue: 8 Linguagem: Inglês

10.1109/cc.2016.7563724

ISSN

1673-5447

Autores

Xiaolin Gui, Jun Liu, Mucong Chi, Chenyu Li, Zhenming Lei,

Tópico(s)

Digital and Cyber Forensics

Resumo

Security and privacy issues are magnified by velocity, volume, and variety of big data. User's privacy is an even more sensitive topic attracting most people's attention. While Xcode-Ghost, a malware of iOS emerging in late 2015, leads to the privacy-leakage of a large number of users, only a few studies have examined Xcode-Ghost based on its source code. In this paper we describe observations by monitoring the network activities for more than 2.59 million iPhone users in a provincial area across 232 days. Our analysis reveals a number of interesting points. For example, we propose a decay model for the prevalence rate of XcodeGhost and we find that the ratio of the infected devices is more than 60%; that a lot of popular applications, such as Wechat, railway 12306, didi taxi, Youku video are also infected; and that the duration as well as the traffic volume of most XcodeGhost-related HTTP-requests is similar with usual HTTP-request which makes it difficult to be found. Besides, we propose a heuristic model based on fingerprint and its web-knowledge to identify the infected applications. The identifying result shows the efficiency of this model.

Referência(s)
Altmetric
PlumX