Monitoring smartphones for anomaly detection

作者: Sahin Albayrak , Florian Lamour , Aubrey-Derrick Schmidt , Frank Peters

DOI: 10.5555/1361492.1361542

关键词: Anomaly detectionMobile deviceState (computer science)Mobile phoneComputer scienceSIMPLE (military communications protocol)Embedded systemMalwareIntrusion detection system

摘要: In this paper we demonstrate how to monitor a smartphone running Symbian OS in order extract features that describe the state of device and can be used for anomaly detection. These are sent remote server, because complex intrusion detection system (IDS) on kind mobile still is not feasible, due capability hardware limitations. We give examples compute some introduce top ten applications by phone users basing study 2005. The usage these recorded visualized first comparison, data results monitoring simple malware given.

参考文章(21)
G.A. Jacoby, N.J. Davis, Battery-based intrusion detection global communications conference. ,vol. 4, pp. 2250- 2255 ,(2004) , 10.1109/GLOCOM.2004.1378409
Stephanie Forrest, Alan S. Perelson, Rajesh Cherukuri, Lawrence Allen, Self-Nonself Discrimination in a Computer Research Papers in Economics. ,(1994)
James A. Mahaffey, James D. Cannady Jr., Brandon Craig Rhodes, Multiple Self-Organizing Maps for Intrusion Detection ,(2000)
Farnam Jahanian, Jon Oberheide, Evan Cooke, CloudAV: N-version antivirus in the network cloud usenix security symposium. pp. 91- 106 ,(2008)
Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, State of the Practice of Intrusion Detection Technologies Defense Technical Information Center. ,(2000) , 10.21236/ADA375846
Teuvo Kohonen, Self-Organizing Maps ,(1995)
G. Roussos, A.J. Marsh, S. Maglavera, Enabling pervasive computing with smart phones IEEE Pervasive Computing. ,vol. 4, pp. 20- 27 ,(2005) , 10.1109/MPRV.2005.30
Jerry Cheng, Starsky H.Y. Wong, Hao Yang, Songwu Lu, SmartSiren Proceedings of the 5th international conference on Mobile systems, applications and services - MobiSys '07. pp. 258- 271 ,(2007) , 10.1145/1247660.1247690
J. Jamaluddin, N. Zotou, R. Edwards, P. Coulton, Mobile phone vulnerabilities: a new generation of malware international symposium on consumer electronics. pp. 199- 202 ,(2004) , 10.1109/ISCE.2004.1375935