Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers

被引:53
|
作者
Damopoulos, Dimitrios [1 ]
Menesidou, Sofia A.
Kambourakis, Georgios
Papadaki, Maria [2 ]
Clarke, Nathan [2 ]
Gritzalis, Stefanos
机构
[1] Univ Aegean, Lab Informat & Commun Syst Secur, Dept Informat & Commun Syst Engn, Info Sec Lab, GR-83200 Karlovassi, Samos, Greece
[2] Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth PL4 8AA, Devon, England
关键词
mobile devices; anomaly-based intrusion detection system; user behaviour; machine learning classifiers; INTRUSION DETECTION; BEHAVIOR;
D O I
10.1002/sec.341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices have evolved and experienced an immense popularity over the last few years. This growth however has exposed mobile devices to an increasing number of security threats. Despite the variety of peripheral protection mechanisms described in the literature, authentication and access control cannot provide integral protection against intrusions. Thus, a need for more intelligent and sophisticated security controls such as intrusion detection systems (IDSs) is necessary. Whilst much work has been devoted to mobile device IDSs, research on anomaly-based or behaviour-based IDS for such devices has been limited leaving several problems unsolved. Motivated by this fact, in this paper, we focus on anomaly-based IDS for modern mobile devices. A dataset consisting of iPhone users data logs has been created, and various classification and validation methods have been evaluated to assess their effectiveness in detecting misuses. Specifically, the experimental procedure includes and cross-evaluates four machine learning algorithms (i.e. Bayesian networks, radial basis function, K-nearest neighbours and random Forest), which classify the behaviour of the end-user in terms of telephone calls, SMS and Web browsing history. In order to detect illegitimate use of service by a potential malware or a thief, the experimental procedure examines the aforementioned services independently as well as in combination in a multimodal fashion. The results are very promising showing the ability of at least one classifier to detect intrusions with a high true positive rate of 99.8%. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 50 条
  • [21] Anomaly-Based Intrusion Detection System in Wireless Sensor Networks Using Machine Learning Algorithms
    Al-Fuhaidi, Belal
    Farae, Zainab
    Al-Fahaidy, Farouk
    Nagi, Gawed
    Ghallab, Abdullatif
    Alameri, Abdu
    [J]. APPLIED COMPUTATIONAL INTELLIGENCE AND SOFT COMPUTING, 2024, 2024
  • [22] HoneYDSPK: Cisco onePK implementation for Anomaly-based IDS and Honeypot services
    Trandafir, Ruxandra
    Carabas, Mihai
    Rughinis, Razvan
    Tapus, Nicoale
    [J]. 2016 15TH ROEDUNET CONFERENCE - NETWORKING IN EDUCATION AND RESEARCH, 2016,
  • [23] Smart home anomaly-based IDS: Architecture proposal and case study
    Lara, Agustin
    Mayor, Vicente
    Estepa, Rafael
    Estepa, Antonio
    Diaz-Verdejo, Jesus E.
    [J]. INTERNET OF THINGS, 2023, 22
  • [24] An Anomaly-Based IDS for Detecting Attacks in RPL-Based Internet of Things
    Farzaneh, Behnam
    Montazeri, Mohammad Ali
    Jamali, Shahram
    [J]. 2019 5TH INTERNATIONAL CONFERENCE ON WEB RESEARCH (ICWR), 2019, : 61 - 66
  • [25] HA-IDS: A Heterogeneous Anomaly-based Intrusion Detection System
    Chau Tran
    Tran Nguyen Vo
    Tran Ngoc Thinh
    [J]. 2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 156 - 161
  • [26] Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN
    Li, Hongda
    Wei, Feng
    Hu, Hongxin
    [J]. PROCEEDINGS OF THE ACM INTERNATIONAL WORKSHOP ON SECURITY IN SOFTWARE DEFINED NETWORKS & NETWORK FUNCTION VIRTUALIZATION (SDN-NFV '19), 2019, : 13 - 16
  • [27] AMD-EC: Anomaly-based Android Malware Detection using Ensemble Classifiers
    Ghaffari, Fariba
    Abadi, Mahdi
    Tajoddin, Asghar
    [J]. 2017 25TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2017, : 2247 - 2252
  • [28] Anomaly-Based Intrusion Detection System Using Support Vector Machine
    Krishnaveni, S.
    Vigneshwar, Palani
    Kishore, S.
    Jothi, B.
    Sivamohan, S.
    [J]. ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, 2020, 1056 : 723 - 731
  • [29] Performance Analysis of Anomaly-Based Network Intrusion Detection Using Feature Selection and Machine Learning Techniques
    Seniaray, Sumedha
    Jindal, Rajni
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2024, : 2321 - 2351
  • [30] Some similarity coefficients and application of data mining techniques to the anomaly-based IDS
    Nikolova, Evgeniya
    Jecheva, Veselina
    [J]. TELECOMMUNICATION SYSTEMS, 2012, 50 (02) : 127 - 135