Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

of

Building an Android IDS on Network Level - DEFCON 21 Slide 1 Building an Android IDS on Network Level - DEFCON 21 Slide 2 Building an Android IDS on Network Level - DEFCON 21 Slide 3 Building an Android IDS on Network Level - DEFCON 21 Slide 4 Building an Android IDS on Network Level - DEFCON 21 Slide 5 Building an Android IDS on Network Level - DEFCON 21 Slide 6 Building an Android IDS on Network Level - DEFCON 21 Slide 7 Building an Android IDS on Network Level - DEFCON 21 Slide 8 Building an Android IDS on Network Level - DEFCON 21 Slide 9 Building an Android IDS on Network Level - DEFCON 21 Slide 10 Building an Android IDS on Network Level - DEFCON 21 Slide 11 Building an Android IDS on Network Level - DEFCON 21 Slide 12 Building an Android IDS on Network Level - DEFCON 21 Slide 13 Building an Android IDS on Network Level - DEFCON 21 Slide 14 Building an Android IDS on Network Level - DEFCON 21 Slide 15 Building an Android IDS on Network Level - DEFCON 21 Slide 16 Building an Android IDS on Network Level - DEFCON 21 Slide 17 Building an Android IDS on Network Level - DEFCON 21 Slide 18 Building an Android IDS on Network Level - DEFCON 21 Slide 19 Building an Android IDS on Network Level - DEFCON 21 Slide 20

YouTube videos are no longer supported on SlideShare

View original on YouTube

Building an Android IDS on Network Level - DEFCON 21 Slide 22 Building an Android IDS on Network Level - DEFCON 21 Slide 23 Building an Android IDS on Network Level - DEFCON 21 Slide 24 Building an Android IDS on Network Level - DEFCON 21 Slide 25

YouTube videos are no longer supported on SlideShare

View original on YouTube

Building an Android IDS on Network Level - DEFCON 21 Slide 27 Building an Android IDS on Network Level - DEFCON 21 Slide 28
Upcoming SlideShare
From Kernel Space to User Heaven #NDH2k13
Next
Download to read offline and view in fullscreen.

7 Likes

Share

Download to read offline

Building an Android IDS on Network Level - DEFCON 21

Download to read offline

BUILDING AN ANDROID IDS ON NETWORK LEVEL at DEFCON 21 by JAIME SANCHEZ

More information at:
Twitter: @segofensiva
Website: http://www.seguridadofensiva.com

Being popular is not always a good thing and hereís why. As mobile devices grow in popularity, so do the incentives for attackers. Mobile malware and threats are clearly on the rise, as attackers experiment with new business models by targeting mobile phones. Nowadays, several behavior-based malware analysis and detection techniques for mobile threats have been proposed for mobile devices. We'll show how we built a new detection framework that will be the first open source Android IDS on network level.

This open source network-based intrusion detection system and network-based intrusion protection system has the ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks, featuring: Protocol analysis, Content searching and Content matching.

In IDS/IPS mode, the program will monitor network traffic and analyze it against a rule set defined by the user, and then perform a specific action based on what has been identified. With the help of custom build signatures, the framework can also be used to detect probes or attacks designed for mobile devices, fool and cheat operating system fingerprinting attempts (like nmap or p0f), server message block probes, etc.

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all
  • ssuser0f7477

    Mar. 7, 2018
  • WaiYanPhyoAung

    Jan. 9, 2017
  • leejiseong75

    Oct. 22, 2015
  • b3h3m0th

    Apr. 29, 2014
  • abimaelcarrasquillo

    Jan. 23, 2014
  • TakeshiWatanabe2

    Nov. 6, 2013
  • alterakey

    Nov. 4, 2013

BUILDING AN ANDROID IDS ON NETWORK LEVEL at DEFCON 21 by JAIME SANCHEZ More information at: Twitter: @segofensiva Website: http://www.seguridadofensiva.com Being popular is not always a good thing and hereís why. As mobile devices grow in popularity, so do the incentives for attackers. Mobile malware and threats are clearly on the rise, as attackers experiment with new business models by targeting mobile phones. Nowadays, several behavior-based malware analysis and detection techniques for mobile threats have been proposed for mobile devices. We'll show how we built a new detection framework that will be the first open source Android IDS on network level. This open source network-based intrusion detection system and network-based intrusion protection system has the ability to perform real-time traffic analysis and packet logging on Internet Protocol (IP) networks, featuring: Protocol analysis, Content searching and Content matching. In IDS/IPS mode, the program will monitor network traffic and analyze it against a rule set defined by the user, and then perform a specific action based on what has been identified. With the help of custom build signatures, the framework can also be used to detect probes or attacks designed for mobile devices, fool and cheat operating system fingerprinting attempts (like nmap or p0f), server message block probes, etc.

Views

Total views

11,226

On Slideshare

0

From embeds

0

Number of embeds

5,228

Actions

Downloads

566

Shares

0

Comments

0

Likes

7

×