Skip to main content
Top

2018 | OriginalPaper | Chapter

Masquerade Detection on Mobile Devices

Authors : Swathi Nambiar Kadala Manikoth, Fabio Di Troia, Mark Stamp

Published in: Guide to Vulnerability Analysis for Computer Networks and Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A masquerade is a type of attack where an intruder attempts to avoid detection by impersonating an authorized user of a system. In this research, we consider the problem of masquerade detection on mobile devices. Specifically, we experiment with a variety of machine learning techniques to determine how accurately we can distinguish mobile users, based on various features. Here, our primary goal is to determine which techniques are most likely to be effective in a more comprehensive masquerade detection system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
3.
go back to reference Bertacchini M, Fierens P (2009) A survey on masquerader detection approaches. In: Proceedings of V Congreso Iberoamericano de Seguridad Informática. Universidad de la República de Uruguay, pp 46–60 Bertacchini M, Fierens P (2009) A survey on masquerader detection approaches. In: Proceedings of V Congreso Iberoamericano de Seguridad Informática. Universidad de la República de Uruguay, pp 46–60
4.
go back to reference Whitney, L (2017) Mobile device authentication a look at behavior-based authentication. cnet news Whitney, L (2017) Mobile device authentication a look at behavior-based authentication. cnet news
6.
go back to reference Whitney, L (2011) Android malware masquerading as Google+ app. cnet news Whitney, L (2011) Android malware masquerading as Google+ app. cnet news
7.
go back to reference Stamp M (2017) Introduction to machine learning with applications in information security. CRC Press Stamp M (2017) Introduction to machine learning with applications in information security. CRC Press
10.
go back to reference Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices. SPSM ’11. ACM, USA, pp 15–26. https://doi.org/10.1145/2046614.2046619 Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices. SPSM ’11. ACM, USA, pp 15–26. https://​doi.​org/​10.​1145/​2046614.​2046619
11.
go back to reference Christodorescu M, Jha S, Kruegel C (2007) Mining specifications of malicious behavior. In: Proceedings of the the 6th joint meeting of the european software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering. ESEC-FSE ’07. ACM, USA, pp 5–14. https://doi.org/10.1145/1287624.1287628 Christodorescu M, Jha S, Kruegel C (2007) Mining specifications of malicious behavior. In: Proceedings of the the 6th joint meeting of the european software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering. ESEC-FSE ’07. ACM, USA, pp 5–14. https://​doi.​org/​10.​1145/​1287624.​1287628
12.
go back to reference Lanzi A, Balzarotti D, Kruegel C, Christodorescu M, Kirda E (2010) Accessminer: using system-centric models for malware protection. In: Proceedings of the 17th ACM conference on computer and communications security.CCS ’10. ACM, USA, pp 399–412. https://doi.org/10.1145/1866307.1866353 Lanzi A, Balzarotti D, Kruegel C, Christodorescu M, Kirda E (2010) Accessminer: using system-centric models for malware protection. In: Proceedings of the 17th ACM conference on computer and communications security.CCS ’10. ACM, USA, pp 399–412. https://​doi.​org/​10.​1145/​1866307.​1866353
13.
14.
go back to reference Comparetti PM, Salvaneschi G, Kirda E, Kolbitsch C, Kruegel C, Zanero S (2010) Identifying dormant functionality in malware programs. In: Proceedings of the 2010 IEEE symposium on security and privacy. SP ’10. IEEE Computer Society, USA. https://doi.org/10.1109/SP.2010.12 Comparetti PM, Salvaneschi G, Kirda E, Kolbitsch C, Kruegel C, Zanero S (2010) Identifying dormant functionality in malware programs. In: Proceedings of the 2010 IEEE symposium on security and privacy. SP ’10. IEEE Computer Society, USA. https://​doi.​org/​10.​1109/​SP.​2010.​12
15.
go back to reference Zhang Y, Yang M, Xu B, Yang Z, Gu G, Ning P, Wang XS, Zang B (2013) Vetting undesirable behaviors in Android apps with permission use analysis. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security. CCS ’13. ACM, USA, pp 611–622. https://doi.org/10.1145/2508859.2516689 Zhang Y, Yang M, Xu B, Yang Z, Gu G, Ning P, Wang XS, Zang B (2013) Vetting undesirable behaviors in Android apps with permission use analysis. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security. CCS ’13. ACM, USA, pp 611–622. https://​doi.​org/​10.​1145/​2508859.​2516689
19.
go back to reference Lamba H, Glazier TJ, Cámara J, Schmerl B, Garlan D, Pfeffer J (2017) Model-based cluster analysis for identifying suspicious activity sequences in software. In: Proceedings of the 3rd ACM on international workshop on security and privacy analytics. IWSPA ’17. ACM, USA, pp 17–22. https://doi.org/10.1145/3041008.3041014 Lamba H, Glazier TJ, Cámara J, Schmerl B, Garlan D, Pfeffer J (2017) Model-based cluster analysis for identifying suspicious activity sequences in software. In: Proceedings of the 3rd ACM on international workshop on security and privacy analytics. IWSPA ’17. ACM, USA, pp 17–22. https://​doi.​org/​10.​1145/​3041008.​3041014
21.
go back to reference Michalopoulos DS, Clarke NL (2006) Intrusion detection system for mobile devices. Adv Netw Comput Commun 205–212 Michalopoulos DS, Clarke NL (2006) Intrusion detection system for mobile devices. Adv Netw Comput Commun 205–212
22.
go back to reference Samfat D, Molva R (1997) IDAMN: an intrusion detection architecture for mobile networks. IEEE J Sel Areas Commun 15:1373–1380 Samfat D, Molva R (1997) IDAMN: an intrusion detection architecture for mobile networks. IEEE J Sel Areas Commun 15:1373–1380
23.
go back to reference Buschkes R, Kesdogan D, Reichl P (1998) How to increase security in mobile networks by anomaly detection. Proceedings of the 14th annual computer security applications conference. pp 23–12 Buschkes R, Kesdogan D, Reichl P (1998) How to increase security in mobile networks by anomaly detection. Proceedings of the 14th annual computer security applications conference. pp 23–12
24.
go back to reference Boukerche A, Nitare MSMA (2002) Behavior-based intrusion detection in mobile phone systems. J Parallel Distr Com 62:1476–1490 Boukerche A, Nitare MSMA (2002) Behavior-based intrusion detection in mobile phone systems. J Parallel Distr Com 62:1476–1490
25.
go back to reference Sun B, Yu F, Wu K, Leung VCM (2004) Mobility-based anomaly detection in cellular mobile networks. Proceedings of ACM wireless security (WiSe’ 04), Philadelphia, PA. pp 61–69 Sun B, Yu F, Wu K, Leung VCM (2004) Mobility-based anomaly detection in cellular mobile networks. Proceedings of ACM wireless security (WiSe’ 04), Philadelphia, PA. pp 61–69
26.
go back to reference Eagle N, Pentland A, Lazer D (2009) Inferring friendship network structure by using mobile phone data. Proc Natl Acad Sci 106(36):15274–15278 Eagle N, Pentland A, Lazer D (2009) Inferring friendship network structure by using mobile phone data. Proc Natl Acad Sci 106(36):15274–15278
27.
go back to reference Trevor H, Robert T, Jerome F (2009) The elements of statistical learning: data mining, inference, and prediction, 3rd edn. Springer, Berlin Trevor H, Robert T, Jerome F (2009) The elements of statistical learning: data mining, inference, and prediction, 3rd edn. Springer, Berlin
32.
go back to reference Vreeken J (2003) Spiking neural networks, an introduction. Technical report, Utrecht University Vreeken J (2003) Spiking neural networks, an introduction. Technical report, Utrecht University
Metadata
Title
Masquerade Detection on Mobile Devices
Authors
Swathi Nambiar Kadala Manikoth
Fabio Di Troia
Mark Stamp
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-92624-7_13

Premium Partner