Skip to main content

2018 | OriginalPaper | Buchkapitel

Masquerade Detection on Mobile Devices

verfasst von : Swathi Nambiar Kadala Manikoth, Fabio Di Troia, Mark Stamp

Erschienen in: Guide to Vulnerability Analysis for Computer Networks and Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A masquerade is a type of attack where an intruder attempts to avoid detection by impersonating an authorized user of a system. In this research, we consider the problem of masquerade detection on mobile devices. Specifically, we experiment with a variety of machine learning techniques to determine how accurately we can distinguish mobile users, based on various features. Here, our primary goal is to determine which techniques are most likely to be effective in a more comprehensive masquerade detection system.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Bertacchini M, Fierens P (2009) A survey on masquerader detection approaches. In: Proceedings of V Congreso Iberoamericano de Seguridad Informática. Universidad de la República de Uruguay, pp 46–60 Bertacchini M, Fierens P (2009) A survey on masquerader detection approaches. In: Proceedings of V Congreso Iberoamericano de Seguridad Informática. Universidad de la República de Uruguay, pp 46–60
4.
Zurück zum Zitat Whitney, L (2017) Mobile device authentication a look at behavior-based authentication. cnet news Whitney, L (2017) Mobile device authentication a look at behavior-based authentication. cnet news
6.
Zurück zum Zitat Whitney, L (2011) Android malware masquerading as Google+ app. cnet news Whitney, L (2011) Android malware masquerading as Google+ app. cnet news
7.
Zurück zum Zitat Stamp M (2017) Introduction to machine learning with applications in information security. CRC Press Stamp M (2017) Introduction to machine learning with applications in information security. CRC Press
10.
Zurück zum Zitat Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices. SPSM ’11. ACM, USA, pp 15–26. https://doi.org/10.1145/2046614.2046619 Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices. SPSM ’11. ACM, USA, pp 15–26. https://​doi.​org/​10.​1145/​2046614.​2046619
11.
Zurück zum Zitat Christodorescu M, Jha S, Kruegel C (2007) Mining specifications of malicious behavior. In: Proceedings of the the 6th joint meeting of the european software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering. ESEC-FSE ’07. ACM, USA, pp 5–14. https://doi.org/10.1145/1287624.1287628 Christodorescu M, Jha S, Kruegel C (2007) Mining specifications of malicious behavior. In: Proceedings of the the 6th joint meeting of the european software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering. ESEC-FSE ’07. ACM, USA, pp 5–14. https://​doi.​org/​10.​1145/​1287624.​1287628
12.
Zurück zum Zitat Lanzi A, Balzarotti D, Kruegel C, Christodorescu M, Kirda E (2010) Accessminer: using system-centric models for malware protection. In: Proceedings of the 17th ACM conference on computer and communications security.CCS ’10. ACM, USA, pp 399–412. https://doi.org/10.1145/1866307.1866353 Lanzi A, Balzarotti D, Kruegel C, Christodorescu M, Kirda E (2010) Accessminer: using system-centric models for malware protection. In: Proceedings of the 17th ACM conference on computer and communications security.CCS ’10. ACM, USA, pp 399–412. https://​doi.​org/​10.​1145/​1866307.​1866353
13.
14.
Zurück zum Zitat Comparetti PM, Salvaneschi G, Kirda E, Kolbitsch C, Kruegel C, Zanero S (2010) Identifying dormant functionality in malware programs. In: Proceedings of the 2010 IEEE symposium on security and privacy. SP ’10. IEEE Computer Society, USA. https://doi.org/10.1109/SP.2010.12 Comparetti PM, Salvaneschi G, Kirda E, Kolbitsch C, Kruegel C, Zanero S (2010) Identifying dormant functionality in malware programs. In: Proceedings of the 2010 IEEE symposium on security and privacy. SP ’10. IEEE Computer Society, USA. https://​doi.​org/​10.​1109/​SP.​2010.​12
15.
Zurück zum Zitat Zhang Y, Yang M, Xu B, Yang Z, Gu G, Ning P, Wang XS, Zang B (2013) Vetting undesirable behaviors in Android apps with permission use analysis. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security. CCS ’13. ACM, USA, pp 611–622. https://doi.org/10.1145/2508859.2516689 Zhang Y, Yang M, Xu B, Yang Z, Gu G, Ning P, Wang XS, Zang B (2013) Vetting undesirable behaviors in Android apps with permission use analysis. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security. CCS ’13. ACM, USA, pp 611–622. https://​doi.​org/​10.​1145/​2508859.​2516689
19.
Zurück zum Zitat Lamba H, Glazier TJ, Cámara J, Schmerl B, Garlan D, Pfeffer J (2017) Model-based cluster analysis for identifying suspicious activity sequences in software. In: Proceedings of the 3rd ACM on international workshop on security and privacy analytics. IWSPA ’17. ACM, USA, pp 17–22. https://doi.org/10.1145/3041008.3041014 Lamba H, Glazier TJ, Cámara J, Schmerl B, Garlan D, Pfeffer J (2017) Model-based cluster analysis for identifying suspicious activity sequences in software. In: Proceedings of the 3rd ACM on international workshop on security and privacy analytics. IWSPA ’17. ACM, USA, pp 17–22. https://​doi.​org/​10.​1145/​3041008.​3041014
21.
Zurück zum Zitat Michalopoulos DS, Clarke NL (2006) Intrusion detection system for mobile devices. Adv Netw Comput Commun 205–212 Michalopoulos DS, Clarke NL (2006) Intrusion detection system for mobile devices. Adv Netw Comput Commun 205–212
22.
Zurück zum Zitat Samfat D, Molva R (1997) IDAMN: an intrusion detection architecture for mobile networks. IEEE J Sel Areas Commun 15:1373–1380 Samfat D, Molva R (1997) IDAMN: an intrusion detection architecture for mobile networks. IEEE J Sel Areas Commun 15:1373–1380
23.
Zurück zum Zitat Buschkes R, Kesdogan D, Reichl P (1998) How to increase security in mobile networks by anomaly detection. Proceedings of the 14th annual computer security applications conference. pp 23–12 Buschkes R, Kesdogan D, Reichl P (1998) How to increase security in mobile networks by anomaly detection. Proceedings of the 14th annual computer security applications conference. pp 23–12
24.
Zurück zum Zitat Boukerche A, Nitare MSMA (2002) Behavior-based intrusion detection in mobile phone systems. J Parallel Distr Com 62:1476–1490 Boukerche A, Nitare MSMA (2002) Behavior-based intrusion detection in mobile phone systems. J Parallel Distr Com 62:1476–1490
25.
Zurück zum Zitat Sun B, Yu F, Wu K, Leung VCM (2004) Mobility-based anomaly detection in cellular mobile networks. Proceedings of ACM wireless security (WiSe’ 04), Philadelphia, PA. pp 61–69 Sun B, Yu F, Wu K, Leung VCM (2004) Mobility-based anomaly detection in cellular mobile networks. Proceedings of ACM wireless security (WiSe’ 04), Philadelphia, PA. pp 61–69
26.
Zurück zum Zitat Eagle N, Pentland A, Lazer D (2009) Inferring friendship network structure by using mobile phone data. Proc Natl Acad Sci 106(36):15274–15278 Eagle N, Pentland A, Lazer D (2009) Inferring friendship network structure by using mobile phone data. Proc Natl Acad Sci 106(36):15274–15278
27.
Zurück zum Zitat Trevor H, Robert T, Jerome F (2009) The elements of statistical learning: data mining, inference, and prediction, 3rd edn. Springer, Berlin Trevor H, Robert T, Jerome F (2009) The elements of statistical learning: data mining, inference, and prediction, 3rd edn. Springer, Berlin
32.
Zurück zum Zitat Vreeken J (2003) Spiking neural networks, an introduction. Technical report, Utrecht University Vreeken J (2003) Spiking neural networks, an introduction. Technical report, Utrecht University
Metadaten
Titel
Masquerade Detection on Mobile Devices
verfasst von
Swathi Nambiar Kadala Manikoth
Fabio Di Troia
Mark Stamp
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-92624-7_13