The base-rate fallacy and its implications for the difficulty of intrusion detection
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Introduction to Modern Information Retrieval
Introduction to Modern Information Retrieval
Diffusion Kernels on Graphs and Other Discrete Input Spaces
ICML '02 Proceedings of the Nineteenth International Conference on Machine Learning
Semantics-Aware Malware Detection
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Histograms of Oriented Gradients for Human Detection
CVPR '05 Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05) - Volume 1 - Volume 01
Machine Learning and Data Mining for Computer Security: Methods and Applications (Advanced Information and Knowledge Processing)
Reality mining: sensing complex social systems
Personal and Ubiquitous Computing
Host-Based Intrusion Detection for Advanced Mobile Devices
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
ICML '06 Proceedings of the 23rd international conference on Machine learning
Star-Structured High-Order Heterogeneous Data Co-clustering Based on Consistent Information Theory
ICDM '06 Proceedings of the Sixth International Conference on Data Mining
Factor-analysis based anomaly detection and clustering
Decision Support Systems
SmartSiren: virus detection and alert for smartphones
Proceedings of the 5th international conference on Mobile systems, applications and services
IEEE Transactions on Knowledge and Data Engineering
Monitoring smartphones for anomaly detection
Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications
Decentralized detector generation in cooperative intrusion detection systems
SSS'07 Proceedings of the 9h international conference on Stabilization, safety, and security of distributed systems
A mobile phone malicious software detection model with behavior checker
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
A malware detector placement game for intrusion detection
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Mobile Malware: The future of mobile malware
Network Security
Efficient location aware intrusion detection to protect mobile devices
Personal and Ubiquitous Computing
Hi-index | 0.00 |
Widespread use and general purpose computing capabilities of next generation smartphones make them the next big targets of malicious software (malware) and security attacks. Given the battery, computing power, and bandwidth limitations inherent to such mobile devices, detection of malware on them is a research challenge that requires a different approach than the ones used for desktop/laptop computing. We present a novel probabilistic diffusion scheme for detecting anomalies possibly indicating malware which is based on device usage patterns. The relationship between samples of normal behavior and their features are modeled through a bipartite graph which constitutes the basis for the stochastic diffusion process. Subsequently, we establish an indirect similarity measure among sample points. The diffusion kernel derived over the feature space together with the Kullback-Leibler divergence over the sample space provide an anomaly detection algorithm. We demonstrate its applicability in two settings using real world mobile phone data. Initial experiments indicate that the diffusion algorithm outperforms others even under limited training data availability.