중앙대학교 다빈치SW교육원

Soft Talent와 Soft Power의 미래를 바꾸는 SW중심대학

커뮤니티

공지사항
2018 해외학자 초청강연 안내(Euijin Choo) (6.27)
작성자 관리자 작성일 2018-06-26 조회수 1494
첨부파일

Seminar


Identification of Malicious Mobile Applications and Vulnerable Devices through Network Traffic Analysis

 

Dr. Euijin Choo (Qatar Computing Research Institute)

 

Abstract

With a rapid growth of mobile data traffic over the past decade, the mobile devices became an attractive target for attackers to exploit. Consequently, analyzing and identifying mobile applications has become an emerging task for network management and security practices. The objective of this research is to investigate and develop approaches to identify and characterize malicious mobile applications and devices through network traffic analysis. There has been a significant amount of research on traffic identification, which can be classified into two categories: protocol analysis based identification and deep packet inspection based identification. Traditional Protocol-based analysis approaches exploit the TCP port numbers to identify applications (e.g., HTTP protocol is used by web application) based on the fact that well-known destination ports are used for specific services. However, port-based analysis is not sufficient to analyze mobile communications, as most mobile applications rely on the HTTP protocol. Alternatively, research on identifying mobile applications has focused on Deep Packet Inspection (DPI) approaches that analyze packet payloads and/or HTTP packet header information. However, DPI analysis is no longer feasible due to the growing use of encrypted protocols such as HTTPS. In this research, we investigate on identifying new malicious mobile applications and vulnerable devices without prior knowledge. Towards achieving this goal, we investigate a 2-step approach where in the first step, we aim to differentiate and cluster different applications into similar application groups or types based on traffic features and similarities. In the second step, using the small set of ground truth labels, we aim to identify related-malicious applications and vulnerable devices. 

 

Bio

Dr. Euijin Choo received her B.S. and M.S. degrees in Computer Science and Engineering from Korea University (double majored in Mathematics for her bachelor) and her Ph.D. in Computer Science from North Carolina State University (NCSU), NC, USA. She is currently working for Qatar Computing Research Institute, Doha, Qatar.

 

 

Seminar Location: Building 310, Unit 731
Seminar Date/Time: June 27th, 2018 (4pm-6pm)

  * 강연장소 : 중앙대학교 310관 731호
* 강연일시 : 2018.6.27 4pm ~ 6pm

Host: Professor Joongheon Kim (02-820-5911, joongheon@cau.ac.kr)
주최/주관: 중앙대학교 다빈치SW교육원