Proceedings of the 1st International ICST Conference on Mobile Wireless Middleware, Operating Systems and Applications 2008
DOI: 10.4108/icst.mobilware2008.2492
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring Smartphones for Anomaly Detection

Abstract: In this paper we demonstrate how to monitor a smartphone running Symbian OS in order to extract features that describe the state of the device and can be used for anomaly detection. These features are sent to a remote server, because running a complex intrusion detection system (IDS) on this kind of mobile device still is not feasible, due to capability and hardware limitations. We give examples on how to compute some of the features and introduce the top ten applications used by mobile phone users basing on a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(32 citation statements)
references
References 6 publications
0
32
0
Order By: Relevance
“…An example of a broad alert may be the current national threat level, namely levels green, blue, yellow, orange, red. Within these levels (which may be interpreted as the environment for CV-KM) more specific focus can be applied by using more sensitive parameters in the templates or by instantiating templates associated with the current, more specific levels, and in the evidence combination algorithms discussed in (Goldschmidt 2006). Weaver and Richardson (2006) present an instructive discussion on threshold settings in dynamic environments.…”
Section: Discussion and Lessons Learnedmentioning
confidence: 99%
See 2 more Smart Citations
“…An example of a broad alert may be the current national threat level, namely levels green, blue, yellow, orange, red. Within these levels (which may be interpreted as the environment for CV-KM) more specific focus can be applied by using more sensitive parameters in the templates or by instantiating templates associated with the current, more specific levels, and in the evidence combination algorithms discussed in (Goldschmidt 2006). Weaver and Richardson (2006) present an instructive discussion on threshold settings in dynamic environments.…”
Section: Discussion and Lessons Learnedmentioning
confidence: 99%
“…Full details of the ALCOD (Alert Coding) system are available at Goldschmidt (2006), where the ALCOD implementation describes the application of the CV-KM prototype to the Australian Stock Market surveillance operation at the time ALCOD was tested. Since then ASX Surveillance have replaced their PMS, and reviewed and rationalized the number of alert types requiring coding.…”
Section: Problem Structurementioning
confidence: 99%
See 1 more Smart Citation
“…Thus, we give a brief overview of related academic research. Schmidt A.D., et al [7][8][9][10][11][12][13]is the pioneer in android security research, they provided both dynamic and static analysis methods for malware detection on android platform. Since then, a series of works on malware detection were proposed, while most of them are transplanted from desktop platform [14][15][16][17].…”
Section: E Status Of Academic Researchmentioning
confidence: 99%
“…According to the study [4][5][6][7][8][9] of malicious code in the application, the paper gives a classification, it is showed in Figure 1. Enck [10] put forward a research method named dynamic taint analysis and had accomplished the design and implementation of TaintDroid.…”
Section: Current Study and Insufficiencymentioning
confidence: 99%