Skip to main content

2013 | OriginalPaper | Buchkapitel

NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

verfasst von : Erol Gelenbe, Gökçe Görbil, Dimitrios Tzovaras, Steffen Liebergeld, David Garcia, Madalina Baltatu, George Lyberopoulos

Erschienen in: Information Sciences and Systems 2013

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As a consequence of the growing popularity of smart mobile devices, mobile malware is clearly on the rise, with attackers targeting valuable user information and exploiting vulnerabilities of the mobile ecosystems. With the emergence of large-scale mobile botnets, smartphones can also be used to launch attacks on mobile networks. The NEMESYS project will develop novel security technologies for seamless service provisioning in the smart mobile ecosystem, and improve mobile network security through better understanding of the threat landscape. NEMESYS will gather and analyze information about the nature of cyber-attacks targeting mobile users and the mobile network so that appropriate counter-measures can be taken. We will develop a data collection infrastructure that incorporates virtualized mobile honeypots and a honeyclient, to gather, detect and provide early warning of mobile attacks and better understand the modus operandi of cyber-criminals that target mobile devices. By correlating the extracted information with the known patterns of attacks from wireline networks, we will reveal and identify trends in the way that cyber-criminals launch attacks against mobile devices.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
This number is for Android alone, which accounts for \(99~\%\) of all encountered malware in 2012 [29].
 
2
http://www.nemesys-project.eu/nemesys/index.html
 
Literatur
1.
Zurück zum Zitat Abdelrahman O, Gelenbe E, Gorbil G, Oklander B (2013) Mobile network anomaly detection and mitigation: the NEMESYS approach. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13) accepted for publication Abdelrahman O, Gelenbe E, Gorbil G, Oklander B (2013) Mobile network anomaly detection and mitigation: the NEMESYS approach. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13) accepted for publication
2.
Zurück zum Zitat Abdelrahman OH, Gelenbe E (2013) Time and energy in team-based search. Phys Rev E 87(3):032125CrossRef Abdelrahman OH, Gelenbe E (2013) Time and energy in team-based search. Phys Rev E 87(3):032125CrossRef
3.
Zurück zum Zitat Aguilar J, Gelenbe E (1997) Task assignment and transaction clustering heuristics for distributed systems. Inf Sci 97(1–2):199–219CrossRef Aguilar J, Gelenbe E (1997) Task assignment and transaction clustering heuristics for distributed systems. Inf Sci 97(1–2):199–219CrossRef
4.
Zurück zum Zitat Baltatu M, D’Alessandro R, D’Amico R (2013) NEMESYS: first year project experience in telecom Italia information technology. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13) accepted for publication Baltatu M, D’Alessandro R, D’Amico R (2013) NEMESYS: first year project experience in telecom Italia information technology. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13) accepted for publication
7.
Zurück zum Zitat Dagon D, Martin T, Starner T (2004) Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Comput 3(4):11–15 Dagon D, Martin T, Starner T (2004) Mobile phones as computing devices: the viruses are coming! IEEE Pervasive Comput 3(4):11–15
8.
Zurück zum Zitat Delosieres L, Garcia D (2013) Infrastructure for detecting Android malware. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13) accepted for publication Delosieres L, Garcia D (2013) Infrastructure for detecting Android malware. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13) accepted for publication
9.
Zurück zum Zitat Felt AP, Finifter M, Chin E, Hanna S, Wagner D (2011) A survey of mobile malware in the wild. In: Proceedings of 1st ACM workshop on security and privacy in smartphones and mobile devices (SPSM’11), pp 3–14 Felt AP, Finifter M, Chin E, Hanna S, Wagner D (2011) A survey of mobile malware in the wild. In: Proceedings of 1st ACM workshop on security and privacy in smartphones and mobile devices (SPSM’11), pp 3–14
10.
Zurück zum Zitat Gelenbe E (2009) Steps toward self-aware networks. Commun ACM 52(7):66–75CrossRef Gelenbe E (2009) Steps toward self-aware networks. Commun ACM 52(7):66–75CrossRef
11.
Zurück zum Zitat Gelenbe E (2010) Search in unknown random environments. Phys Rev E 82(6):061112CrossRef Gelenbe E (2010) Search in unknown random environments. Phys Rev E 82(6):061112CrossRef
12.
13.
Zurück zum Zitat Gelenbe E, Fourneau J-M (1999) Random neural networks with multiple classes of signals. Neural Comput 11(4):953–963CrossRef Gelenbe E, Fourneau J-M (1999) Random neural networks with multiple classes of signals. Neural Comput 11(4):953–963CrossRef
14.
Zurück zum Zitat Gelenbe E, Gorbil G, Wu J-F (2012) Emergency cyber-physical-human systems. In: Proceedings of 21st international conference on computer communications and networks (ICCCN), pp 1–7 Gelenbe E, Gorbil G, Wu J-F (2012) Emergency cyber-physical-human systems. In: Proceedings of 21st international conference on computer communications and networks (ICCCN), pp 1–7
15.
Zurück zum Zitat Gelenbe E, Loukas G (2007) A self-aware approach to denial of service defence. Comput Netw 51(5):1299–1314CrossRefMATH Gelenbe E, Loukas G (2007) A self-aware approach to denial of service defence. Comput Netw 51(5):1299–1314CrossRefMATH
16.
17.
Zurück zum Zitat Gelenbe E, Wu F-J (2012) Large scale simulation for human evacuation and rescue. Comput Math Appl 64(2):3869–3880CrossRef Gelenbe E, Wu F-J (2012) Large scale simulation for human evacuation and rescue. Comput Math Appl 64(2):3869–3880CrossRef
18.
Zurück zum Zitat Golde N, Redon K, Borgaonkar R (2012) Weaponizing femtocells: the effect of rogue devices on mobile telecommunication. In Proceedings 19th annual network and distributed system security, symposium (NDSS’12), pp 1–16 Golde N, Redon K, Borgaonkar R (2012) Weaponizing femtocells: the effect of rogue devices on mobile telecommunication. In Proceedings 19th annual network and distributed system security, symposium (NDSS’12), pp 1–16
19.
Zurück zum Zitat Gorbil G, Filippoupolitis A, Gelenbe E (2012) Intelligent navigation systems for building evacuation. In: computer and information sciences II. Springer, pp 339–345 Gorbil G, Filippoupolitis A, Gelenbe E (2012) Intelligent navigation systems for building evacuation. In: computer and information sciences II. Springer, pp 339–345
20.
Zurück zum Zitat Gorbil G, Gelenbe E (2011) Opportunistic communications for emergency support systems. Procedia Comput Sci 5:39–47CrossRef Gorbil G, Gelenbe E (2011) Opportunistic communications for emergency support systems. Procedia Comput Sci 5:39–47CrossRef
21.
Zurück zum Zitat Gorbil G, Gelenbe E (2013) Disruption tolerant communications for large scale emergency evacuation. In: Proceedingds 11th IEEE international conference on pervasive computing and communications workshops Gorbil G, Gelenbe E (2013) Disruption tolerant communications for large scale emergency evacuation. In: Proceedingds 11th IEEE international conference on pervasive computing and communications workshops
23.
Zurück zum Zitat Lee PP, Bu T, Woo T (2009) On the detection of signaling DoS attacks on 3G/WiMax wireless networks. Comput Netw 53(15):2601–2616CrossRefMATH Lee PP, Bu T, Woo T (2009) On the detection of signaling DoS attacks on 3G/WiMax wireless networks. Comput Netw 53(15):2601–2616CrossRefMATH
24.
Zurück zum Zitat Leita C, Cova M (2011) HARMUR: storing and analyzing historic data on malicious domains. In: Proceedings of 1st workshop on building analysis datasets and gathering experience returns for, security (BADGERS’11), pp 46–53 Leita C, Cova M (2011) HARMUR: storing and analyzing historic data on malicious domains. In: Proceedings of 1st workshop on building analysis datasets and gathering experience returns for, security (BADGERS’11), pp 46–53
25.
Zurück zum Zitat Leita C, Dacier M (2008) SGNET: a worldwide deployable framework to support the analysis of malware threat models. In: Proceedings 7th European dependable computing conference (EDCC’08), pp 99–109 Leita C, Dacier M (2008) SGNET: a worldwide deployable framework to support the analysis of malware threat models. In: Proceedings 7th European dependable computing conference (EDCC’08), pp 99–109
26.
Zurück zum Zitat Liebergeld S, Lange M (2013) Android security, pitfalls, lessons learned and BYOD. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13) accepted for publication Liebergeld S, Lange M (2013) Android security, pitfalls, lessons learned and BYOD. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13) accepted for publication
27.
Zurück zum Zitat Liebergeld S, Lange M, Mulliner C (2013) Nomadic honeypots: a novel concept for smartphone honeypots. In: Proceedings of W’shop on mobile security technologies (MoST’13), in conjunction with the 34th IEEE symposium on security and privacy, accepted for publication Liebergeld S, Lange M, Mulliner C (2013) Nomadic honeypots: a novel concept for smartphone honeypots. In: Proceedings of W’shop on mobile security technologies (MoST’13), in conjunction with the 34th IEEE symposium on security and privacy, accepted for publication
30.
Zurück zum Zitat Papadopoulos S, Tzovaras D (2013) Towards visualizing mobile network data. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13) accepted for publication Papadopoulos S, Tzovaras D (2013) Towards visualizing mobile network data. In: Proceedings of 28th international symposium on computer and information sciences (ISCIS’13) accepted for publication
31.
Zurück zum Zitat Provos N, Holz T (2007) Virtual Honeypots: from Botnet tracking to intrusion detection. Addison Wesley, Jul Provos N, Holz T (2007) Virtual Honeypots: from Botnet tracking to intrusion detection. Addison Wesley, Jul
34.
Zurück zum Zitat Traynor P, Lin M, Ongtang M, Rao V, Jaeger T, McDaniel P, Porta TL (2009) On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: Proceedings of 16th ACM conference on computer and communications, security (CCS’09), pp 223–234 Traynor P, Lin M, Ongtang M, Rao V, Jaeger T, McDaniel P, Porta TL (2009) On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: Proceedings of 16th ACM conference on computer and communications, security (CCS’09), pp 223–234
35.
Zurück zum Zitat Wahlisch M, Vorbach A, Keil C, Schonfelder J, Schmidt TC, Schiller JH (2013) Design, implementation, and operation of a mobile honeypot, arXiv computing research repository, vol abs/1301.7257 Wahlisch M, Vorbach A, Keil C, Schonfelder J, Schmidt TC, Schiller JH (2013) Design, implementation, and operation of a mobile honeypot, arXiv computing research repository, vol abs/1301.7257
36.
Zurück zum Zitat Zhou Y, Jiang X (2012) Dissecting Android malware: characterization and evolution. In: Proceedings of 2012 IEEE symposium on security and privacy, pp 95–109 Zhou Y, Jiang X (2012) Dissecting Android malware: characterization and evolution. In: Proceedings of 2012 IEEE symposium on security and privacy, pp 95–109
Metadaten
Titel
NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem
verfasst von
Erol Gelenbe
Gökçe Görbil
Dimitrios Tzovaras
Steffen Liebergeld
David Garcia
Madalina Baltatu
George Lyberopoulos
Copyright-Jahr
2013
DOI
https://doi.org/10.1007/978-3-319-01604-7_36