{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T01:34:08Z","timestamp":1725845648365},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319276588"},{"type":"electronic","value":"9783319276595"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27659-5_8","type":"book-chapter","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T12:33:52Z","timestamp":1451392432000},"page":"113-129","source":"Crossref","is-referenced-by-count":2,"title":["4GMOP: Mopping Malware Initiated SMS Traffic in Mobile Networks"],"prefix":"10.1007","author":[{"given":"Mari\u00e1n","family":"K\u00fchnel","sequence":"first","affiliation":[]},{"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,30]]},"reference":[{"key":"8_CR1","unstructured":"3GPP. Alphabets and Language-specific Information. TS 23.038, 3rd Generation Partnership Project (3GPP) (2008)"},{"key":"8_CR2","unstructured":"3GPP. Numbering, Addressing and Identification. TS 23.003, 3rd Generation Partnership Project (3GPP) (2008)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Almeida, T.A., Hidalgo, J.M.G., Yamakami, A.: Contributions to the study of sms spam filtering: new collection and results. In: Proceedings of the 11th ACM Symposium on Document Engineering, DocEng 2011, pp. 259\u2013262. ACM (2011)","DOI":"10.1145\/2034691.2034742"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Bilge, L., Balzarotti, D., Robertson, W., Kirda, E., Kruegel, C.: Disclosure: detecting botnet command and control servers through large-scale netflow analysis. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC 2012, pp. 129\u2013138. ACM (2012)","DOI":"10.1145\/2420950.2420969"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Blasing, T., Batyuk, L., Schmidt, A.-D., Camtepe, S.A., Albayrak, S.: An android application sandbox system for suspicious software detection. In: Malicious and Unwanted Software, MALWARE 2010, pp. 55\u201362. IEEE (2010)","DOI":"10.1109\/MALWARE.2010.5665792"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Boser, B.E., Guyon, I.M., Vapnik, V.N.: A training algorithm for optimal margin classifiers. In: Proceedings of the 5th Annual Workshop on Computational Learning Theory, COLT 1992, pp. 144\u2013152. ACM (1992)","DOI":"10.1145\/130385.130401"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Breiman, L.: Random Forests, vol. 45, pp. 5\u201332. Kluwer Academic organizations, Hingham (2001)","DOI":"10.1023\/A:1010933404324"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011, pp. 15\u201326. ACM (2011)","DOI":"10.1145\/2046614.2046619"},{"key":"8_CR9","unstructured":"Chuanxiong Guo, H.J.W., Zhu, W.: Smart-phone attacks and defenses. In: Proceedings of the Third Workshop on Hot Topics in Networks, HotNets III. ACM (2004)"},{"key":"8_CR10","unstructured":"Elish, K.O., Yao, D., Ryder, B.G.: User-centric dependence analysis for identifying malicious mobile apps. In: Workshop on Mobile Security Technologies, IEEE (2012)"},{"key":"8_CR11","unstructured":"Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI 2010, pp. 255\u2013270. USENIX Association (2010)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Enck, W., Traynor, P., McDaniel, P., La Porta, T.: Exploiting open functionality in sms-capable cellular networks. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, pp. 393\u2013404. ACM (2005)","DOI":"10.1145\/1102120.1102171"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Este, A., Gringoli, F., Salgarelli, L.: On-line svm traffic classification. In: 2011 7th International Wireless Communications and Mobile Computing Conference, IWCMC 2011, pp. 1778\u20131783. IEEE (2011)","DOI":"10.1109\/IWCMC.2011.5982804"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Egelman, S., Wagner, D.: I\u2019ve got 99 problems, but vibration ain\u2019t one: a survey of smartphone users\u2019 concerns. In: Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2012, pp. 33\u201344. ACM (2012)","DOI":"10.1145\/2381934.2381943"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2011, pp. 3\u201314. ACM (2011)","DOI":"10.1145\/2046614.2046618"},{"key":"8_CR16","unstructured":"Hoche, M., Kirsch, H., K\u00fchnel, M.: Recommender system for security risk reduction - situational awareness for critical information infrastructures. Technical Report, ASMONIA project (2012)"},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1007\/978-3-642-21040-2_19","volume-title":"Information Security Theory and Practice","author":"J Hua","year":"2011","unstructured":"Hua, J., Sakurai, K.: A SMS-based mobile botnet using flooding algorithm. In: Ardagna, C.A., Zhou, J. (eds.) WISTP 2011. LNCS, vol. 6633, pp. 264\u2013279. Springer, Heidelberg (2011)"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1214\/09-AOAS285","volume":"4","author":"EIG Hugh","year":"2010","unstructured":"Hugh, E.I.G., Chipman, A., McCulloch, R.E.: BART: bayesian additive regression trees. Ann. Appl. Stat. 4, 266\u2013298 (2010)","journal-title":"Ann. Appl. Stat."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Joachims, T.: Making large scale SVM learning practical (1999)","DOI":"10.7551\/mitpress\/1130.003.0015"},{"key":"8_CR20","unstructured":"Lever, C., Antonakakis, M., Reaves, B., Traynor, P., Lee, W.: The core of the matter: analyzing malicious traffic in cellular carriers. In: Proceedings of The 20th Annual Network and Distributed System Security Symposium, NDSS 2013, pp. 1\u201316. ISOC (2013)"},{"key":"8_CR21","unstructured":"Lookout.: Mobile security, state of mobile security. Technical report, Lookout (2012)"},{"key":"8_CR22","unstructured":"Mulliner, C., Miller, C.: Injecting sms messages into smart phones for security analysis. In: Proceedings of the 3rd USENIX Conference on Offensive Technologies, WOOT 2009, pp. 5\u20135. USENIX Association (2009)"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Mulliner, C., Seifert, J.-P.: Rise of the ibots: owning a telco network. In: Malicious and Unwanted Software, MALWARE 2010, pp. 71\u201380. IEEE (2010)","DOI":"10.1109\/MALWARE.2010.5665790"},{"issue":"12","key":"8_CR24","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A Patcha","year":"2007","unstructured":"Patcha, A., Park, J.-M.: An overview of anomaly detection techniques: existing solutions and latest technological trends. Comput. Netw. 51(12), 3448\u20133470 (2007)","journal-title":"Comput. Netw."},{"key":"8_CR25","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-17502-2_12","volume-title":"Security and Privacy in Mobile Information and Communication Systems","author":"P Porras","year":"2010","unstructured":"Porras, P., Sa\u00efdi, H., Yegneswaran, V.: An analysis of the iKee.B iPhone botnet. In: Schmidt, A.U., Russello, G., Lioy, A., Prasad, N.R., Lian, S. (eds.) MobiSec 2010. LNICST, vol. 47, pp. 141\u2013152. Springer, Heidelberg (2010)"},{"key":"8_CR26","unstructured":"Scarfone, K.A., Mell, P.: Guide to intrusion detection and prevention systems (IDPS). Technical Report SP 800\u201394, (2012)"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., McDaniel, P., La Porta, T.: On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS 2009, pp. 223\u2013234. ACM (2009)","DOI":"10.1145\/1653662.1653690"},{"key":"8_CR28","unstructured":"VirusTotal.: Free online virus, malware and url scanner. https:\/\/www.virustotal.com"},{"key":"8_CR29","unstructured":"Xiang, C., Binxing, F., Lihua, Y., Xiaoyi, L., Tianning, Z.: Andbot: towards advanced mobile botnets. In: Proceedings of the 4th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET 2011, pp. 11\u201318. USENIX Association (2011)"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Zeng, Y., Shin, K.G., Hu, X.: Design of sms commanded-and-controlled and p2p-structured mobile botnets. In: Proceedings of the fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2012, pp. 137\u2013148. ACM (2012)","DOI":"10.1145\/2185448.2185467"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Zhou, W., Zhou, Y., Jiang, X., Ning, P.: Detecting repackaged smartphone applications in third-party android marketplaces. In: Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy, CODASPY 2012, pp. 317\u2013326. ACM (2012)","DOI":"10.1145\/2133601.2133640"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, S&P 2012, pp. 95\u2013109. IEEE (2012)","DOI":"10.1109\/SP.2012.16"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27659-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,16]],"date-time":"2023-08-16T09:21:31Z","timestamp":1692177691000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27659-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319276588","9783319276595"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27659-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}