Behavioral and dynamic security functions chaining for Android devices

作者: Gaetan Hurel , Remi Badonnel , Abdelkader Lahmadi , Olivier Festor

DOI: 10.1109/CNSM.2015.7367339

关键词:

摘要: We present an approach for dynamically outsourcing and composing security functions mobile devices, according to the network behavior of their running applications. Applications are characterized from a point view using data mining clustering techniques with aim select appropriate functions. Software-defined networking mechanisms employed chain selected redirect apps traffic through resulting compositions. Those ones can be fully outsourced or split between in-cloud on-device. Both prototype extensive simulations demonstrate feasibility assess its benefits.

参考文章(20)
Mariantonietta La Polla, Fabio Martinelli, Daniele Sgandurra, A Survey on Security for Mobile Devices IEEE Communications Surveys and Tutorials. ,vol. 15, pp. 446- 471 ,(2013) , 10.1109/SURV.2012.013012.00028
Glen Gibb, Hongyi Zeng, Nick McKeown, Outsourcing network functionality acm special interest group on data communication. pp. 73- 78 ,(2012) , 10.1145/2342441.2342457
Jialiu Lin, Norman Sadeh, Shahriyar Amini, Janne Lindqvist, Jason I. Hong, Joy Zhang, Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing ubiquitous computing. pp. 501- 510 ,(2012) , 10.1145/2370216.2370290
Zafar Ayyub Qazi, Cheng-Chun Tu, Luis Chiang, Rui Miao, Vyas Sekar, Minlan Yu, SIMPLE-fying middlebox policy enforcement using SDN acm special interest group on data communication. ,vol. 43, pp. 27- 38 ,(2013) , 10.1145/2486001.2486022
Javier Ferrer, Francisco Chicano, Enrique Alba, Estimating software testing complexity Information & Software Technology. ,vol. 55, pp. 2125- 2139 ,(2013) , 10.1016/J.INFSOF.2013.07.007
Justine Sherry, Shaddi Hasan, Colin Scott, Arvind Krishnamurthy, Sylvia Ratnasamy, Vyas Sekar, Making middleboxes someone else's problem: network processing as a cloud service acm special interest group on data communication. ,vol. 42, pp. 13- 24 ,(2012) , 10.1145/2342356.2342359
Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos, ProfileDroid Proceedings of the 18th annual international conference on Mobile computing and networking - Mobicom '12. pp. 137- 148 ,(2012) , 10.1145/2348543.2348563
Alessandra Gorla, Ilaria Tavecchia, Florian Gross, Andreas Zeller, Checking app behavior against app descriptions international conference on software engineering. pp. 1025- 1035 ,(2014) , 10.1145/2568225.2568276
Shuaifu Dai, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, Dawn Song, NetworkProfiler: Towards automatic fingerprinting of Android apps 2013 Proceedings IEEE INFOCOM. pp. 809- 817 ,(2013) , 10.1109/INFCOM.2013.6566868
Fayazbakhsh SKaveh, L Chiang, V Sekar, M Yu, JC Mogul, Enforcing network-wide policies in the presence of dynamic middlebox actions using flowtags networked systems design and implementation. ,vol. 2014, pp. 533- 546 ,(2014) , 10.5555/2616448.2616497