Protego: A Passive Intrusion Detection System for Android Smartphones

被引:0
|
作者
Joshi, Prachi [1 ]
Jindal, Chani [1 ]
Chowkwale, Mukti [1 ]
Shethia, Rohan [1 ]
Shaikh, Sohail Ahmed [1 ]
Ved, Dhaval [2 ]
机构
[1] MIT Coll Engn, Dept Comp Engn, Pune, Maharashtra, India
[2] Packet Design LLC, Pune, Maharashtra, India
关键词
Intrusion Detection System; Android; Information Security; Machine Learning; Protego;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of smartphones, the security threats have correspondingly increased. Although some form of security mechanisms like authentication and encryption have been provided on platforms such as Android, these alone cannot mitigate all the forms of threats. Thus, the need for an intrusion detection system for smartphones has become immensely important. In this project, we capitalize on earlier approaches of host-based intrusion detection systems and behavior-based intrusion detection systems for Android smartphones to design and implement a host-based, behavior-based passive intrusion detection system, Protego, for Android smartphones. There are two versions - static and dynamic, each with its own novel approach. The static version of Protego improves predictive performance by implementing feature reduction, thus increasing classifier accuracy significantly. The novelty of dynamic approach is that it analyzes live traffic with a minimum delay (in the order of milliseconds). This opens up a variety of use cases for our system, especially in the business world where information security on smartphones is of utmost importance. We have illustrated this by also extending Protego to devise a solution for BYOD (bring your own device), a growing trend in the corporate world, by using the IDS to detect other malicious activities like peer-to-peer traffic from torrent clients.
引用
收藏
页码:232 / 237
页数:6
相关论文
共 50 条
  • [31] Malware Detection on Android Smartphones using API Class and Machine Learning
    Westyarian
    Rosmansyah, Yusep
    Dabarsyah, Budiman
    5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATICS 2015, 2015, : 294 - 297
  • [32] Biometric identification on android smartphones
    Darwaish, Shah Faisal
    Moradian, Esmiralda
    Rahmani, Tirdad
    Knauer, Martin
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS 18TH ANNUAL CONFERENCE, KES-2014, 2014, 35 : 832 - 841
  • [33] Personalized Optimization for Android Smartphones
    Song, Wook
    Kim, Yeseong
    Kim, Hakbong
    Lim, Jehun
    Kim, Jihong
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2014, 13
  • [34] Research on intrusion detection for Android cell phones based on Snort
    Liu, Xiaochun
    Yin, Bo
    Yang, Yongquan
    Wei, Zhiqiang
    2013 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 1, 2013, : 273 - 276
  • [35] Using Android Smartphones in a Service-Oriented Video Surveillance System
    Estevez-Ayres, Iria
    Garcia-Valls, Marisol
    Basanta-Val, Pablo
    Fernandez-Pacheco, Ivan
    IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE 2011), 2011, : 887 - +
  • [36] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [37] Blood Vein Detection System for SmartPhones
    Ahmed, Kazi Istiaque
    Habaebi, Mohamed Hadi
    Islam, Md Rafiqul
    PROCEEDINGS OF THE 2018 7TH INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING (ICCCE), 2018, : 459 - 464
  • [38] Real-time detection and reaction to Activity hijacking attacks in Android smartphones
    Bkakria, Anis
    Graa, Mariem
    Cuppens-Boulahia, Nora
    Cuppens, Frederic
    Lanet, Jean-Louis
    2017 15TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2017, : 253 - 258
  • [39] Fall Detection Using Accelerometer, Gyroscope & Impact Force Calculation on Android Smartphones
    Rungnapakan, Traitot
    Chintakovid, Thippaya
    Wuttidittachotti, Pongpisit
    PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON HCI AND UX (CHIUXID 2018), 2018, : 49 - 53
  • [40] A Survey on Intrusion Detection System (IDS) and Internal Intrusion Detection and Protection System (IIDPS)
    Borkar, Amol
    Donode, Akshay
    Kumari, Anjali
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTING AND INFORMATICS (ICICI 2017), 2017, : 949 - 953