Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers

被引:54
|
作者
Damopoulos, Dimitrios [1 ]
Menesidou, Sofia A.
Kambourakis, Georgios
Papadaki, Maria [2 ]
Clarke, Nathan [2 ]
Gritzalis, Stefanos
机构
[1] Univ Aegean, Lab Informat & Commun Syst Secur, Dept Informat & Commun Syst Engn, Info Sec Lab, GR-83200 Karlovassi, Samos, Greece
[2] Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth PL4 8AA, Devon, England
关键词
mobile devices; anomaly-based intrusion detection system; user behaviour; machine learning classifiers; INTRUSION DETECTION; BEHAVIOR;
D O I
10.1002/sec.341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices have evolved and experienced an immense popularity over the last few years. This growth however has exposed mobile devices to an increasing number of security threats. Despite the variety of peripheral protection mechanisms described in the literature, authentication and access control cannot provide integral protection against intrusions. Thus, a need for more intelligent and sophisticated security controls such as intrusion detection systems (IDSs) is necessary. Whilst much work has been devoted to mobile device IDSs, research on anomaly-based or behaviour-based IDS for such devices has been limited leaving several problems unsolved. Motivated by this fact, in this paper, we focus on anomaly-based IDS for modern mobile devices. A dataset consisting of iPhone users data logs has been created, and various classification and validation methods have been evaluated to assess their effectiveness in detecting misuses. Specifically, the experimental procedure includes and cross-evaluates four machine learning algorithms (i.e. Bayesian networks, radial basis function, K-nearest neighbours and random Forest), which classify the behaviour of the end-user in terms of telephone calls, SMS and Web browsing history. In order to detect illegitimate use of service by a potential malware or a thief, the experimental procedure examines the aforementioned services independently as well as in combination in a multimodal fashion. The results are very promising showing the ability of at least one classifier to detect intrusions with a high true positive rate of 99.8%. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 50 条
  • [1] A STUDY OF MACHINE LEARNING CLASSIFIERS FOR ANOMALY-BASED MOBILE BOTNET DETECTION
    Feizollah, Ali
    Anuar, Nor Badrul
    Salleh, Rosli
    Amalina, Fairuz
    Ma'arof, Ra'uf Ridzuan
    Shamshirband, Shahaboddin
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2013, 26 (04) : 251 - 265
  • [2] Accelerating anomaly-based IDS using Neural Network on GPU
    Nguyen Thi Thanh Van
    Tran Ngoc Thinh
    2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND APPLICATIONS (ACOMP), 2015, : 67 - 74
  • [3] An Anomaly-Based IDS Framework Using Centroid-Based Classification
    Lin, Iuon-Chang
    Chang, Ching-Chun
    Peng, Chih-Hsiang
    SYMMETRY-BASEL, 2022, 14 (01):
  • [4] Optimizing anomaly-based attack detection using classification machine learning
    Gouda, Hany Abdelghany
    Ahmed, Mohamed Abdelslam
    Roushdy, Mohamed Ismail
    NEURAL COMPUTING & APPLICATIONS, 2024, 36 (06): : 3239 - 3257
  • [5] Anomaly-based threat detection in smart health using machine learning
    Tabassum, Muntaha
    Mahmood, Saba
    Bukhari, Amal
    Alshemaimri, Bader
    Daud, Ali
    Khalique, Fatima
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2024, 24 (01)
  • [6] Anomaly-Based Intrusion Detection Using Machine Learning: An Ensemble Approach
    Lalduhsaka R.
    Bora N.
    Khan A.K.
    International Journal of Information Security and Privacy, 2022, 16 (01):
  • [7] Optimizing anomaly-based attack detection using classification machine learning
    Hany Abdelghany Gouda
    Mohamed Abdelslam Ahmed
    Mohamed Ismail Roushdy
    Neural Computing and Applications, 2024, 36 : 3239 - 3257
  • [8] Anomaly-based IDS Implementation in Cloud Environment using BOAT Algorithm
    Vaid, Chetna
    Verma, Harsh K.
    2014 3RD INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2014,
  • [9] Passban IDS: An Intelligent Anomaly-Based Intrusion Detection System for IoT Edge Devices
    Eskandari, Mojtaba
    Janjua, Zaffar Haider
    Vecchio, Massimo
    Antonelli, Fabio
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08): : 6882 - 6897
  • [10] Anomaly-based Network Intrusion Detection using Ensemble Machine Learning Approach
    Das, Abhijit
    Pramod
    Sunitha, B. S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (02) : 635 - 645