Protego: A Passive Intrusion Detection System for Android Smartphones

被引:0
|
作者
Joshi, Prachi [1 ]
Jindal, Chani [1 ]
Chowkwale, Mukti [1 ]
Shethia, Rohan [1 ]
Shaikh, Sohail Ahmed [1 ]
Ved, Dhaval [2 ]
机构
[1] MIT Coll Engn, Dept Comp Engn, Pune, Maharashtra, India
[2] Packet Design LLC, Pune, Maharashtra, India
关键词
Intrusion Detection System; Android; Information Security; Machine Learning; Protego;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of smartphones, the security threats have correspondingly increased. Although some form of security mechanisms like authentication and encryption have been provided on platforms such as Android, these alone cannot mitigate all the forms of threats. Thus, the need for an intrusion detection system for smartphones has become immensely important. In this project, we capitalize on earlier approaches of host-based intrusion detection systems and behavior-based intrusion detection systems for Android smartphones to design and implement a host-based, behavior-based passive intrusion detection system, Protego, for Android smartphones. There are two versions - static and dynamic, each with its own novel approach. The static version of Protego improves predictive performance by implementing feature reduction, thus increasing classifier accuracy significantly. The novelty of dynamic approach is that it analyzes live traffic with a minimum delay (in the order of milliseconds). This opens up a variety of use cases for our system, especially in the business world where information security on smartphones is of utmost importance. We have illustrated this by also extending Protego to devise a solution for BYOD (bring your own device), a growing trend in the corporate world, by using the IDS to detect other malicious activities like peer-to-peer traffic from torrent clients.
引用
收藏
页码:232 / 237
页数:6
相关论文
共 50 条
  • [1] A Cloud-Based Intrusion Detection System for Android Smartphones
    Khune, Rohit S.
    Thangakumar, J.
    2012 INTERNATIONAL CONFERENCE ON RADAR, COMMUNICATION AND COMPUTING (ICRCC), 2012, : 180 - 184
  • [2] A Host and Network Based Intrusion Detection For Android Smartphones
    Ariyapala, Kanishka
    Hoang Giang Do
    Huynh Ngoc Anh
    Ng, Wee Keong
    Conti, Mauro
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 849 - 854
  • [3] A result fusion based distributed anomaly detection system for android smartphones
    Wu, Zhizhong
    Zhou, Xuehai
    Xu, Jun
    Journal of Networks, 2013, 8 (02) : 273 - 282
  • [4] MACHINE LEARNING-BASED ANDROID INTRUSION DETECTION SYSTEM
    Tahreem, Madiha
    Andleeb, Ifrah
    Hussain, Bilal Zahid
    Hameed, Arsalan
    arXiv,
  • [5] Cloud Based Intrusion Detection Architecture for Smartphones
    Kumar, Manish
    Hanumanthappa, M.
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [6] INTRUSION DETECTION MODEL BASED ON ANDROID
    Kou, Xiaoming
    Wen, Qiaoyan
    2011 4TH IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK AND MULTIMEDIA TECHNOLOGY (4TH IEEE IC-BNMT2011), 2011, : 624 - 628
  • [7] Flow Anomaly Based Intrusion Detection System for Android Mobile Devices
    Radoglou-Grammatikis, Panagiotis I.
    Sarigiannidis, Panagiotis G.
    2017 6TH INTERNATIONAL CONFERENCE ON MODERN CIRCUITS AND SYSTEMS TECHNOLOGIES (MOCAST), 2017,
  • [8] Automatic battery charging system on android smartphones
    Djuanda, D. S. R.
    Ramdhani, M.
    Ekaputri, C.
    INTERNATIONAL CONFERENCE ON INNOVATION IN ENGINEERING AND VOCATIONAL EDUCATION 2019 (ICIEVE 2019), PTS 1-4, 2020, 830
  • [9] A Robust Passive Intrusion Detection System with Commodity WiFi Devices
    Ding, Enjie
    Li, Xiansheng
    Zhao, Tong
    Zhang, Lei
    Hu, Yanjun
    JOURNAL OF SENSORS, 2018, 2018
  • [10] DroidApp: An Efficient Android Malware Detection Technique for Smartphones
    Kumar, Manish
    Chatterjee, Kakali
    Singh, Ashish
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, ICICC 2022, VOL 3, 2023, 492 : 311 - 321