Monitoring smartphones for anomaly detection
نویسندگان
چکیده
In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection system (IDS) on this kind of mobile device still is not feasible due to capability and hardware limitations. We give examples on how to compute relevant features and introduce the top ten applications used by mobile phone users based on a study in 2005. The usage of these applications is recorded by a monitoring client and visualized. Additionally, monitoring results of public and self-written malwares are shown. For improving monitoring client performance, Principal Component Analysis (PCA) was applied which lead to a decrease of about 80% of the amount of monitored features. This work was funded by Deutsche Telekom Laboratories. Note that this is a user-built version. The original published version can by found at http://www.springerlink.com DOI:10.1007/s11036008-0113-x. Aubrey-Derrick Schmidt Technische Universität Berlin / DAI-Labor Tel.: +49 (0)30 314 74039 Fax: +49 (0)30 314 74003 E-mail: [email protected] Frank Peters E-mail: [email protected] Florian Lamour E-mail: [email protected] Christian Scheel E-mail: [email protected] Seyit Ahmet Çamptepe E-mail: [email protected] Şahin Albayrak E-mail: [email protected]
منابع مشابه
RoADS: A Road Pavement Monitoring System for Anomaly Detection Using Smart Phones
Monitoring the road pavement is a challenging task. Authorities spend time and finances to monitor the state and quality of the road pavement. This paper investigate road surface monitoring with smartphones equipped with GPS and inertial sensors: accelerometer and gyroscope. In this study we describe the conducted experiments with data from the time domain, frequency domain and wavelet transfor...
متن کاملBehaviour Based Anomaly Detection for Smartphones Using Machine Learning Algorithm
Since the first handheld cellular phone was introduced in 1973, the mobile phones have evolved into immensely popular smartphones. These devices provide all-in-one expediency by integrating traditional mobile phones with handheld computing devices making them more open and general purpose. Smartphones have become hosts for sensitive or personal data and applications. However many smartphones ar...
متن کاملModular Anomaly Detection for Smartphone Ad Hoc Communication
The capabilities of the modern smartphones make them the obvious platform for novel mobile applications. The open architectures, however, also create new vulnerabilities. Measures for prevention, detection, and reaction need to be explored with the peculiarities that resource-constrained devices impose. Smartphones, in addition to cellular broadband network capabilities, include WiFi interfaces...
متن کاملBehaviour based anomaly detection system for smartphones using machine learning algorithm
In this research, we propose a novel, platform independent behaviour-based anomaly detection system for smartphones. The fundamental premise of this system is that every smartphone user has unique usage patterns. By modelling these patterns into a profile we can uniquely identify users. To evaluate this hypothesis, we conducted an experiment in which a data collection application was developed ...
متن کاملA Review of Significance of Energy-Consumption Anomaly in Malware Detection in Mobile Devices
Mobile devices, such as smartphones, have become an important part of modern lives. However, as these devices have tremendously become popular they are attracting a range of attacks. Malware is one of the serious threats posed to smartphones by the attackers. Due to the limited resources of mobile devices malware detection on these devices remains a challenge. Malware detection techniques based...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- MONET
دوره 14 شماره
صفحات -
تاریخ انتشار 2008