Monitoring smartphones for anomaly detection

作者: Aubrey-Derrick Schmidt , Frank Peters , Florian Lamour , Christian Scheel , Seyit Ahmet Camtepe

DOI: 10.1007/S11036-008-0113-X

关键词:

摘要: In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order extract features for anomaly detection. These are sent remote server because complex intrusion detection on kind of mobile device still is not feasible due capability hardware limitations. We give examples compute relevant introduce the top ten applications used by phone users based study 2005. The usage these recorded monitoring client visualized. Additionally, results public self-written malwares shown. For improving performance, Principal Component Analysis was applied which lead decrease about 80% amount monitored features.

参考文章(22)
James A. Mahaffey, James D. Cannady Jr., Brandon Craig Rhodes, Multiple Self-Organizing Maps for Intrusion Detection ,(2000)
Farnam Jahanian, Jon Oberheide, Evan Cooke, CloudAV: N-version antivirus in the network cloud usenix security symposium. pp. 91- 106 ,(2008)
Julia Allen, Alan Christie, William Fithen, John McHugh, Jed Pickel, State of the Practice of Intrusion Detection Technologies Defense Technical Information Center. ,(2000) , 10.21236/ADA375846
Teuvo Kohonen, Self-Organizing Maps ,(1995)
G. Roussos, A.J. Marsh, S. Maglavera, Enabling pervasive computing with smart phones IEEE Pervasive Computing. ,vol. 4, pp. 20- 27 ,(2005) , 10.1109/MPRV.2005.30
Jerry Cheng, Starsky H.Y. Wong, Hao Yang, Songwu Lu, SmartSiren Proceedings of the 5th international conference on Mobile systems, applications and services - MobiSys '07. pp. 258- 271 ,(2007) , 10.1145/1247660.1247690
J. Jamaluddin, N. Zotou, R. Edwards, P. Coulton, Mobile phone vulnerabilities: a new generation of malware international symposium on consumer electronics. pp. 199- 202 ,(2004) , 10.1109/ISCE.2004.1375935
G.D. Abowd, L. Iftode, H. Mitchell, Guest Editors' Introduction: The Smart Phone--A First Platform for Pervasive Computing IEEE Pervasive Computing. ,vol. 4, pp. 18- 19 ,(2005) , 10.1109/MPRV.2005.32
Steven A. Hofmeyr, Stephanie Forrest, Architecture for an Artificial Immune System Evolutionary Computation. ,vol. 8, pp. 443- 473 ,(2000) , 10.1162/106365600568257