Protego: A Passive Intrusion Detection System for Android Smartphones

被引:0
|
作者
Joshi, Prachi [1 ]
Jindal, Chani [1 ]
Chowkwale, Mukti [1 ]
Shethia, Rohan [1 ]
Shaikh, Sohail Ahmed [1 ]
Ved, Dhaval [2 ]
机构
[1] MIT Coll Engn, Dept Comp Engn, Pune, Maharashtra, India
[2] Packet Design LLC, Pune, Maharashtra, India
关键词
Intrusion Detection System; Android; Information Security; Machine Learning; Protego;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the proliferation of smartphones, the security threats have correspondingly increased. Although some form of security mechanisms like authentication and encryption have been provided on platforms such as Android, these alone cannot mitigate all the forms of threats. Thus, the need for an intrusion detection system for smartphones has become immensely important. In this project, we capitalize on earlier approaches of host-based intrusion detection systems and behavior-based intrusion detection systems for Android smartphones to design and implement a host-based, behavior-based passive intrusion detection system, Protego, for Android smartphones. There are two versions - static and dynamic, each with its own novel approach. The static version of Protego improves predictive performance by implementing feature reduction, thus increasing classifier accuracy significantly. The novelty of dynamic approach is that it analyzes live traffic with a minimum delay (in the order of milliseconds). This opens up a variety of use cases for our system, especially in the business world where information security on smartphones is of utmost importance. We have illustrated this by also extending Protego to devise a solution for BYOD (bring your own device), a growing trend in the corporate world, by using the IDS to detect other malicious activities like peer-to-peer traffic from torrent clients.
引用
收藏
页码:232 / 237
页数:6
相关论文
共 50 条
  • [41] General Study of Intrusion Detection System and Survey of Agent Based Intrusion Detection System
    Saxena, Aumreesh Ku.
    Sinha, Sitesh
    Shukla, Piyush
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 417 - 421
  • [42] An Android Vulnerability Detection System
    Zhang, Jiayuan
    Yao, Yao
    Li, Xiaoqi
    Xie, Jian
    Wu, Gaofei
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 169 - 183
  • [43] A novel network intrusion prevention system based on Android platform
    Chen, Guanlin
    Zhou, Kunlong
    Peng, Yubo
    Zhou, Liang
    Zhang, Yong
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2021, 14 (02) : 67 - 76
  • [44] Exploring the Design Space for Android Smartphones
    Hung, Shih-Hao
    Chen, Jen-Hao
    Tu, Chia-Heng
    Shieh, Jeng-Peng
    Chien, Roger
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 215 - 222
  • [45] On Security and Energy Efficiency in Android Smartphones
    Ferreira, Joao
    Santos, Bernardo
    Oliveira, Wellington
    Antunes, Nuno
    Cabral, Bruno
    Fernandes, Joao Paulo
    2023 IEEE/ACM 10TH INTERNATIONAL CONFERENCE ON MOBILE SOFTWARE ENGINEERING AND SYSTEMS, MOBILESOFT, 2023, : 87 - 95
  • [46] Paranoid Android: Versatile Protection For Smartphones
    Portokalidis, Georgios
    Homburg, Philip
    Anagnostakis, Kostas
    Bos, Herbert
    26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), 2010, : 347 - 356
  • [47] Cloud Based SecuritySolution For Android Smartphones
    Marengereke, Tendai Munyaradzi
    Sornalakshmi, K.
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [48] Forensic analysis of WeChat on Android smartphones
    Wu, Songyang
    Zhang, Yong
    Wang, Xupeng
    Xiong, Xiong
    Du, Lin
    DIGITAL INVESTIGATION, 2017, 21 : 3 - 10
  • [49] Side Channel Analysis On Android Smartphones
    Davarci, Erhan
    Soysal, Betul
    Erguler, Imran
    Anarim, Emin
    2016 24TH SIGNAL PROCESSING AND COMMUNICATION APPLICATION CONFERENCE (SIU), 2016, : 553 - 556
  • [50] A cost-based analysis of intrusion detection system configuration under active or passive response
    Yue, Wei T.
    Cakanyildirim, Metin
    DECISION SUPPORT SYSTEMS, 2010, 50 (01) : 21 - 31