Reference Hub8
Misuse Detection for Mobile Devices Using Behaviour Profiling

Misuse Detection for Mobile Devices Using Behaviour Profiling

Fudong Li, Nathan Clarke, Maria Papadaki, Paul Dowland
Copyright: © 2011 |Volume: 1 |Issue: 1 |Pages: 13
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781613506295|DOI: 10.4018/ijcwt.2011010105
Cite Article Cite Article

MLA

Li, Fudong, et al. "Misuse Detection for Mobile Devices Using Behaviour Profiling." IJCWT vol.1, no.1 2011: pp.41-53. http://doi.org/10.4018/ijcwt.2011010105

APA

Li, F., Clarke, N., Papadaki, M., & Dowland, P. (2011). Misuse Detection for Mobile Devices Using Behaviour Profiling. International Journal of Cyber Warfare and Terrorism (IJCWT), 1(1), 41-53. http://doi.org/10.4018/ijcwt.2011010105

Chicago

Li, Fudong, et al. "Misuse Detection for Mobile Devices Using Behaviour Profiling," International Journal of Cyber Warfare and Terrorism (IJCWT) 1, no.1: 41-53. http://doi.org/10.4018/ijcwt.2011010105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Mobile devices have become essential to modern society; however, as their popularity has grown, so has the requirement to ensure devices remain secure. This paper proposes a behaviour-based profiling technique using a mobile user’s application usage to detect abnormal activities. Through operating transparently to the user, the approach offers significant advantages over traditional point-of-entry authentication and can provide continuous protection. The experiment employed the MIT Reality dataset and a total of 45,529 log entries. Four experiments were devised based on an application-level dataset containing the general application; two application-specific datasets combined with telephony and text message data; and a combined dataset that included both application-level and application-specific. Based on the experiments, a user’s profile was built using either static or dynamic profiles and the best experimental results for the application-level applications, telephone, text message, and multi-instance applications were an EER (Equal Error Rate) of 13.5%, 5.4%, 2.2%, and 10%, respectively.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.