Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers

被引:54
|
作者
Damopoulos, Dimitrios [1 ]
Menesidou, Sofia A.
Kambourakis, Georgios
Papadaki, Maria [2 ]
Clarke, Nathan [2 ]
Gritzalis, Stefanos
机构
[1] Univ Aegean, Lab Informat & Commun Syst Secur, Dept Informat & Commun Syst Engn, Info Sec Lab, GR-83200 Karlovassi, Samos, Greece
[2] Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth PL4 8AA, Devon, England
关键词
mobile devices; anomaly-based intrusion detection system; user behaviour; machine learning classifiers; INTRUSION DETECTION; BEHAVIOR;
D O I
10.1002/sec.341
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile devices have evolved and experienced an immense popularity over the last few years. This growth however has exposed mobile devices to an increasing number of security threats. Despite the variety of peripheral protection mechanisms described in the literature, authentication and access control cannot provide integral protection against intrusions. Thus, a need for more intelligent and sophisticated security controls such as intrusion detection systems (IDSs) is necessary. Whilst much work has been devoted to mobile device IDSs, research on anomaly-based or behaviour-based IDS for such devices has been limited leaving several problems unsolved. Motivated by this fact, in this paper, we focus on anomaly-based IDS for modern mobile devices. A dataset consisting of iPhone users data logs has been created, and various classification and validation methods have been evaluated to assess their effectiveness in detecting misuses. Specifically, the experimental procedure includes and cross-evaluates four machine learning algorithms (i.e. Bayesian networks, radial basis function, K-nearest neighbours and random Forest), which classify the behaviour of the end-user in terms of telephone calls, SMS and Web browsing history. In order to detect illegitimate use of service by a potential malware or a thief, the experimental procedure examines the aforementioned services independently as well as in combination in a multimodal fashion. The results are very promising showing the ability of at least one classifier to detect intrusions with a high true positive rate of 99.8%. Copyright (C) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 50 条
  • [11] IDS Performance Analysis using Anomaly-based Detection Method for DOS Attack
    Fadhlillah, Aghnia
    Karna, Nyoman
    Irawan, Arif
    2020 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND INTELLIGENCE SYSTEM (IOTAIS), 2021, : 18 - 22
  • [12] Anomaly-based intrusion detection system in IoT using kernel extreme learning machine
    Bacha S.
    Aljuhani A.
    Abdellafou K.B.
    Taouali O.
    Liouane N.
    Alazab M.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (1) : 231 - 242
  • [13] Anomaly-based intrusion detection system in IoT using kernel extreme learning machine
    Bacha, Sawssen
    Aljuhani, Ahamed
    Abdellafou, Khawla Ben
    Taouali, Okba
    Liouane, Noureddine
    Alazab, Mamoun
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (01) : 231 - 242
  • [14] A Cross-Layer, Anomaly-Based IDS for WSN and MANET
    Amouri, Amar
    Morgera, Salvatore D.
    Bencherif, Mohamed A.
    Manthena, Raju
    SENSORS, 2018, 18 (02):
  • [15] Integrating Anomaly-Based Approach into Bayesian Network Classifiers
    Benferhat, Salem
    Tabia, Karim
    E-BUSINESS AND TELECOMMUNICATIONS, 2009, 48 : 127 - 139
  • [16] Unknown Attacks Detection Using Feature Extraction from Anomaly-based IDS Alerts
    Sato, Masaaki
    Yamaki, Hirofumi
    Takakura, Hiroki
    2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT), 2012, : 273 - 277
  • [17] Evaluation of machine learning classifiers for mobile malware detection
    Fairuz Amalina Narudin
    Ali Feizollah
    Nor Badrul Anuar
    Abdullah Gani
    Soft Computing, 2016, 20 : 343 - 357
  • [18] Evaluation of machine learning classifiers for mobile malware detection
    Narudin, Fairuz Amalina
    Feizollah, Ali
    Anuar, Nor Badrul
    Gani, Abdullah
    SOFT COMPUTING, 2016, 20 (01) : 343 - 357
  • [19] Into the Unknown: Unsupervised Machine Learning Algorithms for Anomaly-Based Intrusion Detection
    Zoppi, Tommaso
    Ceccarelli, Andrea
    Bondavalli, Andrea
    2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S), 2020, : 81 - 81
  • [20] Anomaly-Based NIDS: A Review of Machine Learning Methods on Malware Detection
    Raffie, Mohd Z. A.
    Zuhairi, Megat F.
    Akimi, Shadil Z. A.
    Dao, Hassan
    2016 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICICTM), 2016, : 266 - 270