Term of Award
Summer 2018
Degree Name
Master of Science in Applied Engineering (M.S.A.E.)
Document Type and Release Option
Thesis (open access)
Copyright Statement / License for Reuse
This work is licensed under a Creative Commons Attribution 4.0 License.
Department
Department of Computer Sciences
Committee Chair
Christopher Kadlec
Committee Member 1
Elizabeth Rasnick
Committee Member 2
Lei Chen
Abstract
The idea behind Bring Your Own Device (BYOD) it that personal mobile devices can be used in the workplace to enhance convenience and flexibility. This development encourages organizations to allow access of personal mobile devices to business information and systems for businesses operation. However, BYOD opens a firm to various security risks such as data contamination and the exposure of user interest to criminal activities. Mobile devices were not designed to handle intense data security and advanced security features are frequently turned off. Using personal mobile devices can also expose a system to various forms of security threats like malware. This research aims to analyze mobile network traffic from suspicious mobile applications and investigate data accessible to malicious applications on mobile devices. The research is further intended to observe the behavior of malware on mobile devices. A network with a wireless communication over a centralized access control point was built. The control access point serves as the centralized location for data monitoring, capturing and analyzing of transmitted data from all the devices connected to it. The research demonstrates a procedure for data capturing for analysis from a data collection point which does not require access to each application and allows for the study of potential infections from the outside of the mobile device.
Recommended Citation
1 Downer, K., and Bhattacharya, M.: ‘BYOD security: A New Business Challenge’, in Editor (Ed.)^(Eds.): ‘Book BYOD security: A New Business Challenge’ (IEEE, 2015, edn.), pp. 1128-1133 2 Brooks, C.: ‘BYOD (Bring your own device)’, Chartered Institute for IT–West London Branch.[Online]. Available at: http://www. bcs. org/upload/pdf/cbrooks-oct12. pdf.(Accessed: 22/03/13), 2012 3 Bello Garba, A., Armarego, J., and Murray, D.: ‘BRING YOUR OWN DEVICE ORGANISATIONAL INFORMATION SECURITY AND PRIVACY ’, ARPN Journal of Engineering and Applied Sciences, 2015, 10, (3), pp. 1279-1287 4 Romer, H.: ‘Best practices for BYOD security’, Computer Fraud & Security, 2014, 2014, (1), pp. 13-15 5 Lyon, C., and Osterman, M.: ‘Security BYOD: Be Your Own Defense’, in Editor (Ed.)^(Eds.): ‘Book Security BYOD: Be Your Own Defense’ (ACM, 2014, edn.), pp. 29-32 6 Wei, T.-E., Jeng, A.B., Lee, H.-M., Chen, C.-H., and Tien, C.-W.: ‘Android privacy’, in Editor (Ed.)^(Eds.): ‘Book Android privacy’ (IEEE, 2012, edn.), pp. 1830-1837 7 Jin, R., and Wang, B.: ‘Malware Detection for Mobile Devices Using Software-Defined Networking’, in Editor (Ed.)^(Eds.): ‘Book Malware Detection for Mobile Devices Using Software-Defined Networking’ (IEEE, 2013, edn.), pp. 81-88 8 Zaman, M., Siddiqui, T., Amin, M.R., and Hossain, M.S.: ‘Malware Detection in Android by Network Traffic Analysis’, in Editor (Ed.)^(Eds.): ‘Book Malware Detection in Android by Network Traffic Analysis’ (IEEE, 2015, edn.), pp. 1-5 9 Abdellatif, M., Talhi, C., Hamou-Lhadj, A., and Dagenais, M.: ‘On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis’, in Editor (Ed.)^(Eds.): ‘Book On the Use of Mobile GPU for Accelerating Malware Detection Using Trace Analysis’ (IEEE, 2015, edn.), pp. 42-46 10 Fu, H., Zheng, Z., Bose, S., Bishop, M., and Mohapatra, P.: ‘LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications’, in Editor (Ed.)^(Eds.): ‘Book LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications’ (IEEE, 2017, edn.), pp. 1-9 11 Deypir, M.: ‘A new Approach for Effective Malware Detection in Android-based Devices’, in Editor (Ed.)^(Eds.): ‘Book A new Approach for Effective Malware Detection in Android-based Devices’ (IEEE, 2016, edn.), pp. 112-116 12 Dai, S., Tongaonkar, A., Wang, X., Nucci, A., and Song, D.: ‘Networkprofiler: Towards automatic fingerprinting of Android apps’, in Editor (Ed.)^(Eds.): ‘Book Networkprofiler: Towards automatic fingerprinting of Android apps’ (IEEE, 2013, edn.), pp. 809-817 13 Gorla, A., Tavecchia, I., Gross, F., and Zeller, A.: ‘Checking app behavior against app descriptions’, in Editor (Ed.)^(Eds.): ‘Book Checking app behavior against app descriptions’ (ACM, 2014, edn.), pp. 1025-1035 14 Zhu, H., Xiong, H., Ge, Y., and Chen, E.: ‘Mobile App Recommendations with Security and Privacy Awareness’, in Editor (Ed.)^(Eds.): ‘Book Mobile App Recommendations with Security and Privacy Awareness’ (ACM, 2014, edn.), pp. 951-960 15 Lin, J., Amini, S., Hong, J.I., Sadeh, N., Lindqvist, J., and Zhang, J.: ‘Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing’, in Editor (Ed.)^(Eds.): ‘Book Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing’ (ACM, 2012, edn.), pp. 501-510 16 Su, M.-Y., Fung, K.-T., Huang, Y.-H., Kang, M.-Z., and Chung, Y.-H.: ‘Detection of Android Malware: Combined with Static Analysis and Dynamic Analysis’, in Editor (Ed.)^(Eds.): ‘Book Detection of Android Malware: Combined with Static Analysis and Dynamic Analysis’ (IEEE, 2016, edn.), pp. 1013-1018 17 Bayer, U., Kirda, E., and Kruegel, C.: ‘Improving the Efficiency of Dynamic Malware Analysis’, in Editor (Ed.)^(Eds.): ‘Book Improving the Efficiency of Dynamic Malware Analysis’ (ACM, 2010, edn.), pp. 1871-1878 18 Gilbert, P., Chun, B.-G., Cox, L.P., and Jung, J.: ‘Vision: automated security validation of mobile apps at app markets’, in Editor (Ed.)^(Eds.): ‘Book Vision: automated security validation of mobile apps at app markets’ (ACM, 2011, edn.), pp. 21-26
Research Data and Supplementary Material
No