Advertisement

Towards an Autonomous Host-Based Intrusion Detection System for Android Mobile Devices

  • José RibeiroEmail author
  • Georgios Mantas
  • Firooz B. Saghezchi
  • Jonathan Rodriguez
  • Simon J. Shepherd
  • Raed A. Abd-Alhameed
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 263)

Abstract

In the 5G era, mobile devices are expected to play a pivotal role in our daily life. They will provide a wide range of appealing features to enable users to access a rich set of high quality personalized services. However, at the same time, mobile devices (e.g., smartphones) will be one of the most attractive targets for future attackers in the upcoming 5G communications systems. Therefore, security mechanisms such as mobile Intrusion Detection Systems (IDSs) are essential to protect mobile devices from a plethora of known and unknown security breaches and to ensure user privacy. However, despite the fact that a lot of research effort has been placed on IDSs for mobile devices during the last decade, autonomous host-based IDS solutions for 5G mobile devices are still required to protect them in a more efficient and effective manner. Towards this direction, we propose an autonomous host-based IDS for Android mobile devices applying Machine Learning (ML) methods to inspect different features representing how the device’s resources (e.g., CPU, memory, etc.) are being used. The simulation results demonstrate a promising detection accuracy of above 85%, reaching up to 99.99%.

Keywords

Mobile Intrusion Detection System Android Security 5G communications Machine Learning Malware detection Host-based IDS 

Notes

Acknowledgments

José Ribeiro would like to acknowledge his PhD grant funded by the Fundação para a Ciência e Tecnologia (FCT-Portugal) with reference SFRH/BD/112755/2015. This work is supported by the European Regional Development Fund (FEDER), through the Regional Operational Programme of Centre (CENTRO 2020) of the Portugal 2020 framework [Project MOBITRUST with Nr. 003343 (CENTRO-01-0247-FEDER-003343)].

References

  1. 1.
    Polla, L., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Commun. Surv. Tutor. 15(1), 446–471 (2013)CrossRefGoogle Scholar
  2. 2.
    Becher, M., Freiling, F.C., Hoffmann, J., Holtz, T., Uellenbeck, S., Wolf, C.: Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices. In: Security and Privacy (SP), pp. 96–111. IEEE (2011)Google Scholar
  3. 3.
    Mantas, G., Komninos, N., Rodriguez, J., Logota, E., Marques, H.: Security for 5G Communications, pp. 207–220. Wiley, Chichester (2015)Google Scholar
  4. 4.
    Arabo, A., Pranggono, B.: Mobile malware and smart devices security: trends, challenges and solutions. In: Control Systems and Computer (CSCS), 2013 19th International Conference, pp. 526–531. IEEE (2013)Google Scholar
  5. 5.
    Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: “Andromaly”: a behavioral malware detection framework for android devices. J. Intell. Inf. Syst. 38(1), 161–190 (2012)CrossRefGoogle Scholar
  6. 6.
    Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15–26. ACM, October 2011Google Scholar
  7. 7.
    Xu, R., Saïdi, H., Anderson, R.: Aurasium: practical policy enforcement for Android applications. In: Proceedings of 21st USENIX Conference on Security Symposium. USENIX Association (2012)Google Scholar
  8. 8.
    Borges, P., et al.: Towards a hybrid intrusion detection system for android-based PPDR terminals. In: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, pp. 1034–1039 (2017)Google Scholar
  9. 9.
    Ulltveit-Moe, N., Oleshchuk, V.A., Koien, G.M.: Location-aware mobile intrusion detection with enhanced privacy in 5G context. Wireless Pers. Commun. 57(3), 317–338 (2011)CrossRefGoogle Scholar
  10. 10.
    Huang, D., Zhang, X., Kang, M., Luo, J.: MobiCloud: building secure cloud framework for mobile computing and communication. In: 2010 Fifth IEEE International Symposium in Service Oriented System Engineering (SOSE), pp. 27–34 (2010)Google Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2019

Authors and Affiliations

  • José Ribeiro
    • 1
    • 2
    Email author
  • Georgios Mantas
    • 1
    • 3
  • Firooz B. Saghezchi
    • 1
  • Jonathan Rodriguez
    • 1
  • Simon J. Shepherd
    • 2
  • Raed A. Abd-Alhameed
    • 2
  1. 1.Instituto de TelecomunicaçõesAveiroPortugal
  2. 2.Engineering and InformaticsUniversity of BradfordBradfordUK
  3. 3.Faculty of Engineering and ScienceUniversity of GreenwichLondonUK

Personalised recommendations