Self-Organizing Maps
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Guest Editors' Introduction: The Smart Phone--A First Platform for Pervasive Computing
IEEE Pervasive Computing
Enabling Pervasive Computing with Smart Phones
IEEE Pervasive Computing
Architecture for an Artificial Immune System
Evolutionary Computation
A Machine Learning Evaluation of an Artificial Immune System
Evolutionary Computation
Host-Based Intrusion Detection for Advanced Mobile Devices
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
Combining Self-Organizing Map Algorithms for Robust and Scalable Intrusion Detection
CIMCA '05 Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation and International Conference on Intelligent Agents, Web Technologies and Internet Commerce Vol-2 (CIMCA-IAWTIC'06) - Volume 02
ICMLA '06 Proceedings of the 5th International Conference on Machine Learning and Applications
SmartSiren: virus detection and alert for smartphones
Proceedings of the 5th international conference on Mobile systems, applications and services
Mobile Device Profiling and Intrusion Detection Using Smart Batteries
HICSS '08 Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences
CloudAV: N-version antivirus in the network cloud
SS'08 Proceedings of the 17th conference on Security symposium
On lightweight mobile phone application certification
Proceedings of the 16th ACM conference on Computer and communications security
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
Journal of Systems and Software
Location-Aware Mobile Intrusion Detection with Enhanced Privacy in a 5G Context
Wireless Personal Communications: An International Journal
Understanding human-smartphone concerns: a study of battery life
Pervasive'11 Proceedings of the 9th international conference on Pervasive computing
Crowdroid: behavior-based malware detection system for Android
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
"Andromaly": a behavioral malware detection framework for android devices
Journal of Intelligent Information Systems
UbiMI: ubiquitous mobile instrumentation
Proceedings of the 2012 ACM Conference on Ubiquitous Computing
MADAM: a multi-level anomaly detector for android malware
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
A Distributed and Collaborative Intrusion Detection Architecture for Wireless Mesh Networks
Mobile Networks and Applications
Hi-index | 0.00 |
In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection system on this kind of mobile device still is not feasible due to capability and hardware limitations. We give examples on how to compute relevant features and introduce the top ten applications used by mobile phone users based on a study in 2005. The usage of these applications is recorded by a monitoring client and visualized. Additionally, monitoring results of public and self-written malwares are shown. For improving monitoring client performance, Principal Component Analysis was applied which lead to a decrease of about 80% of the amount of monitored features.