PECULIARITIES OF INFORMATION SECURITY IN MOBILE DEVICES RUNNING THE ANDROID OPERATING SYSTEM
https://doi.org/10.21822/2073-6185-2019-46-2-71-80
Abstract
Objectives The article presents a formal model of information security in mobile devices running the Android operating system, an example of detection and investigation of malicious software, as well as static and dynamic analysis of malicious software.
Method To protect sensitive information on mobile devices, you can use software and organizational measures at the same time.
Result The proposed formal model of information security and analysis of suspected malicious software will ensure the security of information in mobile devices, as well as reduce the risk of threats to an acceptable level at a minimum cost of the protection system. The presented algorithm of the application designed for illegal transfer of funds, as well as an example of the analysis of this application will allow the specialist to improve the quality of their professional tasks in the analysis of incidents in the field of information security.
Conclusion Due to the fact that today there is no scientifically based method of detection and analysis of malicious software in the memory of mobile devices, the information provided in this article will help to improve the efficiency of information protection in mobile devices running the Android operating system.
About the Authors
Yu. M. BarkalovRussian Federation
Deputy head of information security Department,
53 Patriotov Str.,Voronezh 394065
A. D. Nesterov
Russian Federation
Adjunct,
53 Patriotov Str.,Voronezh 394065
References
1. Zashchita informatsii. Osnovnyye terminy i opredeleniya: GOST R 50922-2006. – vzamen GOST R 50922-96; vved. 01.02.2008 // SPS «Konsul'tant-Plyus». – Rezhim dostupa: http://www.consultant.ru. [Information protection. Basic terms and definitions: GOST R 50922-2006. – instead of GOST R 50922-96; enter. 01.02.2008 // ATP "Consultant-Plus". – Access mode: http://www.consultant.ru. (In Russ.)]
2. GOST R ISO/MEK 15408-1-2008. Informatsionnaya tekhnologiya. Metody i sredstva obespecheniya bezopasnosti. Kriterii otsenki bezopasnosti informatsionnykh tekhnologiy. Chast' 1. Vvedeniye i obshchaya model'. – Vved. 2009-10-01. [GOST R ISO/IEC 15408-1-2008. Information technology. Methods and means of security. Criteria for assessing the security of information technology. Part 1. Introduction and General model. – Enter. 2009-10-01. (In Russ.)]
3. Doktrina informatsionnoy bezopasnosti Rossiyskoy Federatsii : utv. Prezidentom Rossiy-skoy Federatsii №646 ot 06.12.2016 // SPS «Konsul'tant Plyus». – Rezhim dostupa: http://www.consultant.ru [The doctrine of information security of the Russian Federation : app. President of the Russian Federation №646 from 06.12.2016 // ATP "Consultant Plus". – Access mode: http://www.consultant.ru. (In Russ.)]
4. Nesterov S. A. Informatsionnaya bezopasnost' : uchebnik i praktikum dlya akademicheskogo bakalavriata / S. A. Nesterov. Moskva : Izdatel'stvo Yurayt, 2017. 321 s. (Universitety Rossii). ISBN 978-5-534-00258-4. Tekst : elektronnyy // EBS Yurayt [sayt]. URL: https://www.biblio-online.ru/bcode/398687 (data obrashcheniya: 15.06.2019). [Nesterov S. A. Information security : textbook and workshop for academic undergraduate / S. A. Nesterov. Moscow : Yurayt Publishing House, 2017. 321 p. (Russian Universities). ISBN 978-5-534-00258-4. Text : electronic // EBS yurayt [website]. URL: https://www.biblio-online.ru/bcode/398687 (date accessed: 15.06.2019). (In Russ.)]
5. Biryukov A.A. Informatsionnaya bezopasnost'. Zashchita i napadeniye. 2-ye izdaniye. M.: DMK-Press, 2017. [Biryukov A. A. Information security. Defense and offense. 2nd edition. M.: DMK-Press, 2017. (In Russ.)]
6. Nesterov A.D., Barkalov YU.M. Vyyavleniye ugroz informatsionnoy bezopasnosti v mobil'nykh operatsionnykh sistemakh // Vserossiyskaya nauchno-prakticheskaya konferentsiya. Aktual'nyye voprosy ekspluatatsii sistem okhrany i zashchishchennykh telekommunikatsionnykh sistem. - Voronezh: Voronezhskiy institut MVD Rossii, 2016. - S. 17-19. [Nesterov A.D., Barkalov Yu. M. Identification of information security threats in mobile operating systems // all-Russian scientific and practical conference. Topical issues of operation of security systems and secure telecommunications systems. - Voronezh: Voronezh Institute of the Russian interior Ministry, 2016. pp. 17-19. (In Russ.)]
7. Kichuk D.YA., Burdinskiy I.A. Osobennosti issledovaniya informatsii v mobil'nykh ustroy-stvakh pod upravleniyem OS Android po prestupleniyam v sfere distantsionnogo bankovskogo obsluzhivaniya // Aktual'nyye voprosy ekspluatatsii sistem okhrany i zashchishchennykh telekommunikatsionnykh sistem. Voro-nezh: Voronezhskiy institut MVD, 2018. S. 123-124. [Kichuk D. Ya., Burdinsky I. A. Features of information research in mobile devices running Android OS on crimes in the field of remote banking // Actual issues of operation of security systems and secure telecommunications systems. Voronezh: Voronezh Institute of the interior Ministry, 2018. pp. 123-124. (In Russ.)]
8. Nesterov A.D., Barkalov YU.M. Organizatsionno-pravovoye obespecheniye polucheniya informatsii iz mobil'nykh ustroystv i oblachnykh khranilishch pri rassledovanii intsidentov v sfere informatsionnoy bezopasnosti // Mezhdunarodnaya nauchnoprakticheskaya konferentsiya. Prestupnost' v SNG: Problemy preduprezhdeniya i raskrytiya prestupleniy. - Voronezh: Voronezhskiy institut MVD Rossii, 2015. - S. 34-36. [Nesterov A.D., Barkalov Yu. M. Organizational and legal support for obtaining information from mobile devices and cloud storage in the investigation of incidents in the field of information security // international scientific and practical conference. Crime in the CIS: Problems of crime prevention and detection. - Voronezh: Voronezh Institute of the Russian interior Ministry, 2015. pp. 34-36. (In Russ.)]
9. Analiz ugroz informatsionnoy bezopasnosti sovremennykh mobil'nykh sistem / Zhernakov S. V., Gavrilov G. N. // Integratsionnyye protsessy nauki XXI veka: sbornik statey Mezhdunarodnoy nauchno-prakticheskoy konferentsii. Sterlitamak: RITS AMI, 2015. C. 54 - 60. [Analysis of threats to information security of modern mobile systems / Zhernakov S. V., G Gavrilov. N. // Integration processes of science of the XXI century: collection of articles of scientific and practical International conference. Sterlitamak: the RITZ, 2015. pp. 54 - 60. (In Russ.)]
10. Detektirovaniye vredonosnogo programmnogo obespecheniya v mobil'noy operatsionnoy sisteme na baze Android na osnove razresheniy s primeneniyem metoda opornykh vektorov / Zhernakov S. V., Gavrilov G. N. // Nauchno periodicheskoye izdaniye Ceteris Paribus: Yevropeyskiy fond innovatsionnogo razvitiya. Yezhemes. nauch. zhurnal «Ceteris Paribus», 2015.S. 10 -14. [Detection of malicious software in Android-based mobile operating system based on resolutions using the support vector machine / Zhernakov S. V., Gavrilov G. N. // Scientific periodical Ceteris Paribus: European Foundation for innovative development. Every minute. science. journal "Ceteris Paribus", 2015.pp. 10 -14. (In Russ.)]
11. Mastkhev dlya mobil'noy analitiki. Chto nuzhno, chtoby vskryvat' prilozheniya dlya Android na Android // Khaker URL: https://xakep.ru/2019/03/12/mobile-analytics-must-have/ (data obrashcheniya: 15.06.2019). [A must have for mobile Analytics. You need to open Android apps on the Android // Hacker URL: https://xakep.ru/2019/03/12/mobile-analytics-must-have/ (accessed: 15.06.2019). (In Russ.)]
12. Uyazvimost' v Android pozvolyayet perekhvatyvat' konfidentsial'nyye dannyye // Khaker URL: https://xakep.ru/2018/09/03/wifi-broadcasts-leak/ (data obrashcheniya: 15.06.2019). [Vulnerability in Android allows you to intercept sensitive data // Hacker URL: https://xakep.ru/2018/09/03/wifi-broadcasts-leak/ (date of application: 15.06.2009). (In Russ.)]
13. Barkalov YU.M. Metodika rassledovaniya prestupleniy v sfere distantsionnogo bankovskogo obsluzhivaniya // Obshchestvennaya bezopasnost', zakonnost' i pravoporyadok v III tysyacheletii. Voronezh: Voronezhskiy institut MVD Rossii, 2015. S. 172-176. [Barkalov Yu. M. Methods of investigation of crimes in the field of remote banking // Public security, law and order in the III Millennium. Voronezh: Voronezh Institute of the Russian interior Ministry, 2015. pp. 172-176. (In Russ.)]
14. Barkalov YU.M. Provedeniye ekspertizy programmnogo obespecheniya mobil'nykh ustroystv pod upravleniyem OS "Android" // Prestupnost' v sfere informatsionnykh i telekommunikatsionnykh tekhnologiy: problemy preduprezhdeniya, raskrytiya i rassledovaniya prestupleniy. Voronezh: Voronezhskiy institut MVD Rossii, 2016. S. 137-142. [Barkalov Yu. M. Examination of software for mobile devices running OS "Android" // Crime in the field of information and telecommunication technologies: problems of prevention, detection and investigation of crimes. Voronezh: Voronezh Institute of the Russian interior Ministry, 2016. pp. 137-142 (In Russ.)]
15. Barkalov YU.M., Perminov G.V. Vyyavleniye NSD k mobil'nym ustroystvam, ispol'zuyemym v ISOD MVD Rossii // Okhrana, bezopasnost', svyaz'. Voronezh: Voronezhskiy institut MVD Rossii, 2017. S. 32-36. [Barkalov S. M., Perminov, G. V., Detection of unauthorized access to mobile devices used in ISOD of the MIA of Russia // Security, safety, connectivity. Voronezh: Voronezh Institute of the Russian interior Ministry, 2017. pp. 32-36. (In Russ.)]
Review
For citations:
Barkalov Yu.M., Nesterov A.D. PECULIARITIES OF INFORMATION SECURITY IN MOBILE DEVICES RUNNING THE ANDROID OPERATING SYSTEM. Herald of Dagestan State Technical University. Technical Sciences. 2019;46(2):71-80. (In Russ.) https://doi.org/10.21822/2073-6185-2019-46-2-71-80