Anomaly-based intrusion detection and prevention systems for mobile devices: Design and development

作者: Δημήτριος Δαμόπουλος , Dimitrios Damopoulos

DOI:

关键词:

摘要: Mobile devices have evolved and experienced an immense popularity over the last few years. Nevertheless, this growth has exposed mobile to increasing number of security threats. It is thus for sure that despite variety peripheral protection mechanisms described in literature, (post)authentication access control techniques imposed by Operating Systems (OS) such devices, integral against advanced intrusions cannot be adequately enforced. More specifically, sophisticated, powerful OSs, as Android iOS, services they can support bring new opportunities attackers toward compromising device data stored on it. This along with rise malware which anticipated comprise a serious threat near future. Therefore, research community constantly seeking solutions cope these newly-introduced perils. Thus, need more intelligent sophisticated controls Intrusion Detection Prevention (IDPS) deemed necessary. However, whilst much work been devoted IDSs general, anomaly-based or behavior-based IDS limited leaving several problems unsolved. Motivated fact, doctoral thesis focuses design development anomaly IDPS modern devices. Moreover, best our knowledge, it first explore, propose evaluate behavioral-based characteristics used towards enchancing context we show monitoring user’s touch patterns behaviors utilize popular applications (e.g., SMS, Call, Internet), and/or profiling native system calls produced active (running) service, one able very reliable accurate detecting malicious behavior malwares unauthorised use. The IPD proposed evaluated present are capable undocumented illegitimate usage services. achieved providing continuous authentication ensure legitimate use prevent threats via post-authentication non-repudiation response schemes. supported experimental results attest e ciency mechanisms. particular emphasis throughout put understand, explore how novel exploited violate confidentiality, integrity, availability, authenticity privacy requirements means that, attacking smartphone platforms services, considering di↵erent attack vectors, allowed us create proper IDP Last but not least, theoretical framework introduced o↵ering food thought future exciting field.

参考文章(144)
Yuval Elovici, Bracha Shapira, Lior Rokach, Dudu Mimran, Lena Chekina, Detection of Deviations in Mobile Applications Network Behavior arXiv: Cryptography and Security. ,(2012)
Vipin Kumar, Jaideep Srivastava, Aleksandar Lazarevic, Managing Cyber Threats: Issues, Approaches, and Challenges (Massive Computing) Springer-Verlag New York, Inc.. ,(2005)
B. Morris, Symbian OS Architecture Sourcebook John Wiley & Sons. ,(2006)
Karim O. Elish, Xuxian Jiang, Barbara G. Ryder, Danfeng Yao, A Static Assurance Analysis of Android Applications Department of Computer Science, Virginia Polytechnic Institute & State University. ,(2013)
Liang Cai, Hao Chen, TouchLogger: inferring keystrokes on touch screen from smartphone motion usenix conference on hot topics in security. pp. 9- 9 ,(2011)
Georgios Kambourakis, Dimitrios Damopoulos, A Competent Post-Authentication and Non-Repudiation Biometric-based Scheme for M-Learning Artificial Intelligence and Applications. ,(2013) , 10.2316/P.2013.792-005
, Seyed Hasan Mortazavi Zarch, Data Mining For Intrusion Detection in Mobile Systems IOSR Journal of Computer Engineering. ,vol. 6, pp. 42- 47 ,(2012) , 10.9790/0661-0654247
André Simão, Fábio Sícoli, Laerte Melo, Flávio Deus, Rafael Sousa Júnior, Acquisition and Analysis of Digital Evidence in Android Smartphones The International Journal of Forensic Computer Science. ,vol. 6, pp. 28- 43 ,(2011) , 10.5769/J201101002