Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method

被引:96
作者
Shabtai, Asaf [1 ]
Kanonov, Uri [1 ]
Elovici, Yuval [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Informat Syst Engn, Deutsch Telekom Labs, IL-84105 Beer Sheva, Israel
关键词
Intrusion detection; Mobile devices; Temporal reasoning; Knowledge-based systems; Malware; Android;
D O I
10.1016/j.jss.2010.03.046
中图分类号
TP31 [计算机软件];
学科分类号
081205 [计算机软件];
摘要
In this paper, a new approach for detecting previously unencountered malware targeting mobile device is proposed. In the proposed approach, time-stamped security data is continuously monitored within the target mobile device (i.e., smartphones, PDAs) and then processed by the knowledge-based temporal abstraction (KBTA) methodology. Using KBTA, continuously measured data (e.g., the number of sent SMSs) and events (e.g., software installation) are integrated with a mobile device security domain knowledge-base (i.e., an ontology for abstracting meaningful patterns from raw, time-oriented security data), to create higher level, time-oriented concepts and patterns, also known as temporal abstractions. Automatically-generated temporal abstractions are then monitored to detect suspicious temporal patterns and to issue an alert. These patterns are compatible with a set of predefined classes of malware as defined by a security expert (or the owner) employing a set of time and value constraints. The goal is to identify malicious behavior that other defensive technologies (e.g., antivirus or firewall) failed to detect. Since the abstraction derivation process is complex, the KBTA method was adapted for mobile devices that are limited in resources (i.e., CPU, memory, battery). To evaluate the proposed modified KBTA method a lightweight host-based intrusion detection system (HIDS), combined with central management capabilities for Android-based mobile phones, was developed. Evaluation results demonstrated the effectiveness of the new approach in detecting malicious applications on mobile devices (detection rate above 94% in most scenarios) and the feasibility of running such a system on mobile devices (CPU consumption was 3% on average). (C) 2010 Elsevier Inc. All rights reserved.
引用
收藏
页码:1524 / 1537
页数:14
相关论文
共 37 条
[1]
Aguilar J., 2005, INT J COMPUTATIONAL, V3, P27
[2]
MAINTAINING KNOWLEDGE ABOUT TEMPORAL INTERVALS [J].
ALLEN, JF .
COMMUNICATIONS OF THE ACM, 1983, 26 (11) :832-843
[3]
[Anonymous], J COMPUTER SECURITY
[4]
[Anonymous], 2008, PROC 41 ANN HAWAII I, DOI [10.1109/HICSS.2008.319, DOI 10.1109/HICSS.2008.319]
[5]
[Anonymous], PERV COMP COMM WORKS
[6]
Bose A., 2008, P 6 INT C MOB SYST A
[7]
From desktop to mobile: Examining the security experience [J].
Botha, Reinhardt A. ;
Furnell, Steven M. ;
Clarke, Nathan L. .
COMPUTERS & SECURITY, 2009, 28 (3-4) :130-137
[8]
CAPSUL: A constraint-based specification of repeating patterns in time-oriented data [J].
Chakravarty, S ;
Shahar, Y .
ANNALS OF MATHEMATICS AND ARTIFICIAL INTELLIGENCE, 2000, 30 (1-4) :3-22
[9]
Cheng J, 2007, P 5 INT C MOB SYST A
[10]
Debar H., 2003, P REC ADV INTR DET R