期刊文献+

基于Android的流量监控白名单策略 被引量:4

White List Strategy for Traffic Monitoring Based on Android
下载PDF
导出
摘要 Android安全问题是制约Android应用发展的一个重要因素,分析了目前Android流量监控系统存在的安全缺陷,针对Android恶意软件吸费问题,提出了一种基于白名单的流量监控改进策略。该策略实施在协议层,通过建立白名单数据库实现对应用进程的联网访问控制。实验结果表明,改进后的流量监控系统在当前网络环境下,加强了对应用联网的约束,能有效降低流量损失,增强系统安全性。 The security issue of Android is one of the major factors that restrict the application.of Android. To solve the problem of some Android soft- ware sucking fee maliciously, a thorough study about the security defects of the Android traffic monitoring system is conducted and an improved strategy implemented at protocol layer is proposed. In this improved strategy, a white list is built in order to control the connection of applications. As a result, on current network environment, the improved strategy of traffic monitoring system can enhance the safety of Android and reduce the loss of flow efficient- ly, so that it meets the needs of the majority of Android users very well.
出处 《电视技术》 北大核心 2013年第5期92-95,共4页 Video Engineering
关键词 ANDROID 安全问题 流量监控 白名单 Android security traffic monitoring white list
  • 相关文献

参考文献8

  • 1McMee Labs. McMee Q3 2011 Threats Report Shows 2011 on Target to Be the Busiest in Mobile Malware History[ EB/OL]. [2012-06-20]. http:// cn. reuters, com/article/pressRelease/idUS117347 + 21 - Nov - 2011 + BW201111217 symbol =INTC. O.
  • 2黄婧,张林,季刊,李文龙.基于Android平台的GPRS流量统计系统[J].计算机系统应用,2011,20(12):141-143. 被引量:8
  • 3沈才樑,唐科萍,俞立峰,樊甫伟.Android权限提升漏洞攻击的检测[J].电信科学,2012,28(5):115-119. 被引量:18
  • 4张毅,何远,唐红,徐光侠.加权行为特征的智能手机安全监控研究[J].电视技术,2011,35(1):122-124. 被引量:2
  • 5金泰延,宋亨周,朴知勋,等.Android框架揭秘[M].北京:人民邮电出版社,2012.
  • 6ENCK W, ONGTANG M, MCDANIEL P. Understanding Android security [ J ]. IEEE Security & Privacy,2009,7 ( 1 ) :53-54.
  • 7SHABTAI A, FLEDEK Y, KANONOV U, et al. Google Android: a compre- hensive security assessment[J]. IEEE Security & Privacy,2010:35-38.
  • 8NEMETH E ,SNYDER G. UNIX and Linux system administration hand- book[ M]. [S. 1. ]:Prentice Hall,2010.

二级参考文献20

  • 1陈雅娴,袁津生,郭敏哲.基于行为异常的Symbian蠕虫病毒检测方法[J].计算机系统应用,2008,17(11):49-52. 被引量:5
  • 2Haseman C. Android Essentials. New York: Apress, 2008: 19-29.
  • 3Murphy ML. Android Development, United States: Commons Ware, 2008:263-275.
  • 4高焕堂.Android应用框架原理与程式设计.第3版.台北:MISOO设计中心,2008.243-246.
  • 5Shabtai A, Fledek Y, Kanonov U, et al. Google android:a comprehensive security assessment. IEEE Security & Privacy, 2010.
  • 6符易阳周丹平.Android安全机制分析.第26次全国计算机安全学术交流会论文集.2011.
  • 7期廖明华,郑力明.Android安全机制分析与解决方案初探.科学技术与工程,2009,26(11):6351-6354.
  • 8Enck W,Ongtang M,McDaniel P. Understanding android security. IEEE Security & Piracy, 2009,7(1):53-54.
  • 9Shabtai A, Wiess Y, Kanonov U, et al. Andromaly:a behavioral malware detection framework for Android devices. Intelligent Information Systems,2011.
  • 10Shabtai A, Kanonov U, Elovici Y. Detection, alert and responseto malicious behavior in mobile devices: knowledge- based approach.RAID, 2009.

共引文献26

同被引文献46

  • 1曾文献,兴百桥,贾娇.基于Android的3G手机移动视频监控系统设计[J].微型机与应用,2013,32(23):58-60. 被引量:2
  • 2张军强.一种基于android平台的网络流量异常监控软件设计[J].自动化与仪器仪表,2016(3):22-23. 被引量:3
  • 3陆伟峰.监视和控制网络出口BT流量——北京伟世盾安公司PU网络流量优化服务器的监控方案[J].计算机安全,2005(2):40-42. 被引量:5
  • 4李刚疯狂Android讲义【M].北京:电子工业出版社,2013.
  • 5网秦2011年第一季度全球Android手机安全报告[EB/OL].http://wenku.baidu.com/link?url=jHElTZFranBpac74X9xxcjzqovQflP8 mD PHxyZaBVSwn4ltEwo_sgDFUkubGFZsgD lanWO-YBV6F7FDWR Jt0a lkLmqoq53X6160bC7B 0Ri, 2012.
  • 6张磊,孙文生.Android在移动应用中的新特性与实现[EB/OL].http://www.paper.edu.cn/releasepaper/content/201212-1114, 2012-12,.
  • 7YOON H J. A study on the performance of Android platform]. International Journal on Computer Science and Engineering, 2012, 4(04): 532-537.
  • 8SCHMIDT A D, SCHMIDT H G, CLAUSEN J, et al. Enhancing security of linux-based android devices[C]//in Proceedings of 15th Intemation,'tl Linux Kongress. Lehmann. 2008.
  • 9BLASING T, BATYUK L, SCHMIDT A D, et al. An Android application sandbox system for suspicious software detection[C]// Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on. IEEE. 2010: 55-62.
  • 10Montpetit M J, MC'dard M. Video-centric network coding strategies for 4G wireless networks: An overview. In: The 7'h Consumer Communications and Networking Conference. I.as Vegas: IEEE Press, 2010,1-5.

引证文献4

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部