Bin Cao, Zhen Chen, Hongjia Liu, G. Ma, Peng Zhang, Guodong Peng
{"title":"Black Box Testing for Cloud-Based Client Security Software in Network Behaviors","authors":"Bin Cao, Zhen Chen, Hongjia Liu, G. Ma, Peng Zhang, Guodong Peng","doi":"10.1109/ICNDC.2013.9","DOIUrl":null,"url":null,"abstract":"With the rapid growth of Internet, the amount of malicious codes is exploding. Some security software vendors provide new cloud-based safeguard software for client users. These software, as part of Internet ware, consist of many modules with different functions and Internet behaviors. The Trojan scanning module, for instance, is based on cloud scanning function, which is achieved by collecting a large number of suspicious files on users' hosts and scanning them in remote cloud platforms. While providing security, they also bring a serious problem of user privacy. In this paper, we use black box testing method to analyze the network behavior of four safeguard software, especially the Trojan scanning module based on cloud scanning function. In specific, we conduct extensive experiments to examine the network behaviors of the major function modules used by these safeguard software. In this paper we present a reasonable network behavior model that can help the safeguard software to protect users' privacy. One way of looking at our contributions is the network behavior comparison and analysis of four safeguard software which are widely used in China. And the experimental results validate our claims either.","PeriodicalId":152234,"journal":{"name":"2013 Fourth International Conference on Networking and Distributed Computing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Fourth International Conference on Networking and Distributed Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNDC.2013.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
With the rapid growth of Internet, the amount of malicious codes is exploding. Some security software vendors provide new cloud-based safeguard software for client users. These software, as part of Internet ware, consist of many modules with different functions and Internet behaviors. The Trojan scanning module, for instance, is based on cloud scanning function, which is achieved by collecting a large number of suspicious files on users' hosts and scanning them in remote cloud platforms. While providing security, they also bring a serious problem of user privacy. In this paper, we use black box testing method to analyze the network behavior of four safeguard software, especially the Trojan scanning module based on cloud scanning function. In specific, we conduct extensive experiments to examine the network behaviors of the major function modules used by these safeguard software. In this paper we present a reasonable network behavior model that can help the safeguard software to protect users' privacy. One way of looking at our contributions is the network behavior comparison and analysis of four safeguard software which are widely used in China. And the experimental results validate our claims either.