skip to main content
10.1145/2695664.2695813acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

On-device anomaly detection for resource-limited systems

Published:13 April 2015Publication History

ABSTRACT

As small-scale embedded systems such as Smartphones rapidly evolve, mobile malwares grow increasingly more sophisticated and dangerous. An important attack vector targeting Android Smartphone is repackaging legitimate applications to inject malicious activities, where such repackaging can be performed before or after the installation of applications on the Smartphone. To detect the behaviour deviation of applications caused by the injected malicious activities, complex anomaly detection algorithms are usually applied, however they require a system resources budget that is beyond the capacities of these small-scale devices. This paper focuses on the usability of on-device anomaly detection algorithms and proposes a detection framework for Android-based devices. The proposed solution allows using a remote server without relying entirely on it. The experimental results allow building resources consumption profiles of the studied anomaly detections algorithms and thus, provide reliable measurements that help define trade-offs between detection accuracy and resource consumption.

References

  1. M. Frazier, The BeagleBoard: $149 Linux System, 2008. Available from: http://www.linuxjournal.com/content/beagleboard-149-linux-systemGoogle ScholarGoogle Scholar
  2. S. Joly, TBS2910 Mini PC ARM Matrix, 2014. Available from: http://domotique-info.fr/2014/04/tbs2910-mini-pc-arm-matrix/Google ScholarGoogle Scholar
  3. E. Millard, "Cabir: World's First Wireless Worm", 2004. Available from: http://www.technewsworld.com/story/34542.htmlGoogle ScholarGoogle Scholar
  4. J. Abhishek, "Android SMS malware hosted on Google Play infects 1.2 Million users". Available from: http://www.hackleaks.in/2014/02/android-sms-malware-hosted-on-google.htmlGoogle ScholarGoogle Scholar
  5. Sophos, "Mobile Security Threat Report 2014". Available from: http://www.sophos.com/en-us/medialibrary/PDFs/other/sophos-mobile-security-threat-report.pdfGoogle ScholarGoogle Scholar
  6. M. Zhao et al. "AntiMalDroid: an efficient SVM-based malware detection framework for Android." Information Computing and Applications. Springer Berlin Heidelberg, 2011. 158--166.Google ScholarGoogle Scholar
  7. Aafer, Yousra, Wenliang Du, and Heng Yin. "DroidAPIMiner: Mining API-level features for robust malware detection in android." Security and Privacy in Communication Networks. Springer International Publishing, 2013. 86--103.Google ScholarGoogle Scholar
  8. gumstix.com, "Overoő FE COM", 2014. Available from: https://store.gumstix.com/index.php/products/256/Google ScholarGoogle Scholar
  9. apc.io, "APC 8750", 2014. Available from: http://apc.io/products/8750a/Google ScholarGoogle Scholar
  10. Gary Ng, "The 16GB Samsung Galaxy S5 Has Less Than 8GB of Usable Storage", 2014. Available from: http://www.iphoneincanada.ca/news/galaxy-s5-8gb-usable-storage/Google ScholarGoogle Scholar
  11. Warrender, C., Forrest, S., & Pearlmutter, B. (1999). "Detecting intrusions using system calls: Alternative data models". In Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on (pp. 133--145). IEEE.Google ScholarGoogle Scholar
  12. Sultana, A., Hamou-Lhadj, A., & Couture, M. (2012, June). "An improved Hidden Markov Model for anomaly detection using frequent common patterns". In Communications (ICC), 2012 IEEE International Conference on (pp. 1113--1117). IEEE.Google ScholarGoogle Scholar
  13. Jain, R., & Abouzakhar, N. S. (2013). "Comparative Study of Hidden Markov Model and Support Vector Machine in Anomaly Intrusion Detection".Google ScholarGoogle Scholar
  14. Li, W., & Meng, Y. (2013). "Improving the performance of neural networks with random forest in detecting network intrusions". In Advances in Neural Networks --- ISNN 2013 (pp. 622--629). Springer Berlin Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Forrest, SA. Hofmeyr, and A. Somayaji. "A sense of self for Unix process". In Proceedings of the 1996 IEEE symposium on research in security and privacy, Oakland California, pp. 120--128, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. Hubballi, S. Biswas, and S. Nandi. (2010). "Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection". Availability, Reliability, and Security, 2010. ARES '10 International Conference on, vol., no., pp. 321, 326.Google ScholarGoogle Scholar
  17. M. C. T. Kymie and A. M Roy. 2002. "Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (SP '02). IEEE Computer Society, Washington, DC, USA, 188-. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. Amontamavut, Y. Nakagawa, and E. Hayakawa. "Separated Linux Process Logging Mechanism for Embedded Systems" Embedded and Real-Time Computing Systems and Applications (RTCSA), 2012 IEEE 18th International Conference on, vol., no., pp.411, 414, 19-22 Aug. 2012 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Panda labs. "Panda Security Annual Report PandaLabs 2013 Summary", 2013. Available from: http://m.itcafe.hu/dl/cnt/2014-03/107032/pandalabs-annual-report-2013.pdfGoogle ScholarGoogle Scholar
  20. S. Forrest, S. Hofmeyr, and A. Somayaji. "The evolution of system-call monitoring" Computer Security Applications Conference, 2008. ACSAC 2008. Annual. IEEE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Amamra, C. Talhi, and J-M Robert. "Impact of Dataset Representation on Smartphone Malware Detection Performance" Trust Management VII. Springer Berlin Heidelberg, 2013. 166--176.Google ScholarGoogle Scholar
  22. H. Neminath, B. Santosh, and N. Sukumar. "Sequencegram: n-gram modeling of system calls for program based anomaly detection". In Communication Systems and Networks (COMSNETS), pp. 1--10, Jan 2011Google ScholarGoogle Scholar
  23. J. Guofei, Chen. Haifeng, C. Ungureanu, and K. Yoshihira. "Multi-resolution Abnormal Trace Detection Using Varied-length N-grams and Automata". International Conference on Autonomic Computing (ICAC 2005), pp. 111, 122, 13-16 June 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. N. Wang, J. Han, and J. Fang. "Anomaly Sequences Detection from Logs Based on Compression". arXiv preprint arXiv:1109.1729, 2011.Google ScholarGoogle Scholar
  25. J. Alakuijala and V. Lode. "Data compression using Zopfli". Tech. rep. Google Inc., Feb.Google ScholarGoogle Scholar

Index Terms

  1. On-device anomaly detection for resource-limited systems

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                SAC '15: Proceedings of the 30th Annual ACM Symposium on Applied Computing
                April 2015
                2418 pages
                ISBN:9781450331968
                DOI:10.1145/2695664

                Copyright © 2015 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 13 April 2015

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                SAC '15 Paper Acceptance Rate291of1,211submissions,24%Overall Acceptance Rate1,650of6,669submissions,25%

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader