2012 15th International Conference on Network-Based Information Systems 2012
DOI: 10.1109/nbis.2012.53
|View full text |Cite
|
Sign up to set email alerts
|

TCADS: Trustworthy, Context-Related Anomaly Detection for Smartphones

Abstract: In this paper we propose a novel, network-based, distributed anomaly detection framework for smartphones. Our approach is based upon the distributed collection of arbitrary, static and dynamic smartphone features. Our approach is not limited to features that can be obtained directly on a device, but also includes features that are provided by other services running in the respective, corporate IT infrastructure (e.g. an IDS). Furthermore, we tag each collected feature with two kinds of information: (1) context… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2
2
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 11 publications
0
1
0
Order By: Relevance
“…• System applications: The architecture of Android contains system applications at the top which offers the basic functionality such as email management, calendar etc. Generally, Android features is collected via rooted [229], [230] or unrooted [231] devices that can be passed as an input to ML models to learn the characteristics to distinguish between the benign and malicious apps. Android uses Google play as an official market store that hosts the apps and there are more than hundred third-party app stores that also host the Android applications.…”
Section: ) Deep Neural Network (Dnn)mentioning
confidence: 99%
“…• System applications: The architecture of Android contains system applications at the top which offers the basic functionality such as email management, calendar etc. Generally, Android features is collected via rooted [229], [230] or unrooted [231] devices that can be passed as an input to ML models to learn the characteristics to distinguish between the benign and malicious apps. Android uses Google play as an official market store that hosts the apps and there are more than hundred third-party app stores that also host the Android applications.…”
Section: ) Deep Neural Network (Dnn)mentioning
confidence: 99%