Skip to main content

Strengthening Mobile Network Security Using Machine Learning

  • Conference paper
  • First Online:
Mobile Web and Intelligent Information Systems (MobiWIS 2016)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9847))

Included in the following conference series:

Abstract

Lately, several episodes of tapping and tracking of mobile phones in Europe including Norway have been revealed, showing the vulnerabilities of both the mobile network and mobile phones. A better protection of the user’s confidentiality and privacy is urgently required. This paper will present an innovative mobile network security system using machine learning. The paper will start with a vulnerability and threat analysis of the evolving mobile network, which is a fusion of mobile wireless technologies and Internet technologies, complemented with the Internet of Things. The main part of the paper will concentrate on clarifying how machine learning can help improving mobile network security. The focus will be on elucidating what makes machine learning superior to other techniques. A special case study on the detection of IMSI Catcher, the fake base station that is used in mobile phone tracking and tapping, will be explained.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. van Thanhe, D., Jørstad, I., van Thuan, D.: Strong authentication for web services with mobile universal identity. In: Younas, M., Awan, I., Mecella, M. (eds.) MobiWIS 2015. LNCS, vol. 9228, pp. 27–36. Springer, Heidelberg (2015). ISSN 0302-9743, ISSN 1611-3349 (electronic), ISBN 978-3-319-23143-3, ISBN 978-3-319-23144-0 (e-book)

    Chapter  Google Scholar 

  2. Foss, A.B., Johansen, P.A., Hager-Thoresen, F.: Secret surveillance of Norway’s leaders detected; Aftenposten, 16 Dec 2014. http://www.aftenposten.no/nyheter/iriks/Secret-surveillance-of-Norways-leaders-detected-7825278.html

  3. Security Research Labs. https://opensource.srlabs.de/

  4. Priority One Security. http://www.p1sec.com/corp/

  5. SBA Research. https://www.sba-research.org/

  6. Openbts.org. http://openbts.org/

  7. The Osmocom (Open Source Mobile Communication) project. http://openbsc.osmocom.org/trac/wiki/OsmocomOverview

  8. Android IMSI-Catcher Detector (#AIMSICD). https://secupwn.github.io/Android-IMSI-Catcher-Detector/

  9. Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., Weippl, E.R.: IMSI-catch me if you can: IMSI-catcher-catchers. In: Annual Computer Security Applications Conference (ACSAC). ACM 978-1-4503-3005-3/14/12 (2014)

    Google Scholar 

  10. Daehyun Strobel: IMSI Catcher, Chair for Communication Security, Ruhr-Universität Bochum, 13 July 2007

    Google Scholar 

  11. The Osmocom (Open Source Mobile Communication) project – OsmocomBB. https://osmocom.org/projects/baseband

  12. Mitchell, T.M.: Machine Learning. Mcgraw-Hill Companies Inc., New York (1997). ISBN ISBN-0-47-042807-7

    MATH  Google Scholar 

  13. Yegneswaran, V., Giffin, J.T., Barford, P., Jha, S.: An architecture for generating semantics-aware signatures. In: Proceedings of the 14th USENIX Security Symposium, pp. 97–112 (2005)

    Google Scholar 

  14. van Do, T., Nguyen, H.T., Momchil, N., Do, V.T.: Detecting IMSI-catcher using soft computing. In: Berry, M.W., Mohamed, A.H., Yap, B.W. (eds.) SCDS 2015. CCIS, vol. 545, pp. 129–140. Springer, Heidelberg (2015). ISSN 1865-0929 ISSN 1865-0937 (electronic)

    Chapter  Google Scholar 

  15. GSMK CRYPTOPHONE. http://www.cryptophone.de/en/

  16. Security Research Labs: SnoopSnitch app. https://play.google.com/store/apps/developer?id=Security+Research+Labs&hl=no

  17. Vert, R., Vert, J.-P.: Consistency and convergence rates of one-class SVMs and related algorithms. JMLR 7, 817–854 (2006)

    MathSciNet  MATH  Google Scholar 

  18. Aftenposten data set. http://www.aftenposten.no/meninger/kommentarer/Derfor-publiserer-Aftenposten-hele-datagrunnlaget-for-mobilspionasje-sakene-7849555.html

  19. Anomaly Detection algorithm from Twitter. https://github.com/twitter/AnomalyDetection

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thanh van Do .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Do, V.T., Engelstad, P., Feng, B., van Do, T. (2016). Strengthening Mobile Network Security Using Machine Learning. In: Younas, M., Awan, I., Kryvinska, N., Strauss, C., Thanh, D. (eds) Mobile Web and Intelligent Information Systems. MobiWIS 2016. Lecture Notes in Computer Science(), vol 9847. Springer, Cham. https://doi.org/10.1007/978-3-319-44215-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-44215-0_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-44214-3

  • Online ISBN: 978-3-319-44215-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics