Abstract
Personal mobile devices, as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by an unintended person may result in a severe security incident concerning private or corporate data and services. Organizations develop their security policy and mobilize preventive techniques against unauthorized use. Current solutions, however, are still breakable and there still exists strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define what measures to monitor.
In this paper, an attempt is made to identify suitable characteristics and measures for mobile-user substitution detection. Our approach is based on the idea that aspects of user behavior and environment reflect user’s personality in a recognizable way. The paper provides a tentative list of individual behavioral and environmental aspects, along with characteristics and measures to represent them.
Chapter PDF
References
D. Anderson, T. Lunt, H. Javitz, A. Tamaru, and A. Valdes. Detecting unusual program behavior using the statistical components of NIDES. SRI Technical Report SRI-CRL-95-06, Computer Science Laboratory, SRI International, Menlo Park, California, May 1995.
Debra Anderson, Thane Frivold, and Alfonso Valdes. Next-generation intrusion detection expert system (NIDES): A summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California, May 1995.
A. Bandura. Social Foundations of Thought and Action: A Social Cognitive Theory. Englewood Cliffs, NJ: Prentice Hall, 1986.
Albert Bandura. Social cognitive theory. Annals of Child Development, 6:1–60, 1989.
C.S. Carver and M.F. Scheier. Perspectives on personality. Allyn and Bacon, Boston, 4 edition, 2000.
Nathan L. Clarke, Steven M. Furnell, Philip M. Rodwell, and Paul L. Reynolds. Acceptance of subscriber authentication methods for mobile telephony devices. Computers & Security, 21(3):220–228, 2002.
H. J. Eysenck. The structure of human personality. Methuen, London, 3 edition, 1970.
Anup K. Ghosh, Aaron Schwartzbard, and Michael Schatz. Learning program behavior profiles for intrusion detection. In 1 st USENIX Workshop on Intrusion Detection and Network Monitoring, pages 51–62, Berkeley, CA, USA, April 1999. USENIX Association.
Steven A. Hofmeyr, Stephanie Forrest, and Anil Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 6(3):151–180, 1998.
Terran Lane. Machine Learning Techniques for the Computer Security Domain of Anomaly Detection. Ph.D. thesis, Purdue University, W. Lafayette, IN, 2000.
Terran Lane and Carla E. Brodley. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security, 2(3):295–331, 1999.
Wenke Lee and Salvatore Stolfo. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC), 3(4):227–261, 2000.
Roy A. Maxion and Tahlia N. Townsend. Masquerade detection using truncated command lines. In Proceedings of the International Conference on Dependable Systems and Networks, pages 219–228, Los Alamitos, California, June 2002. IEEE Computer Society Press.
R. R. McCrae and Jr. Costa, P. T. Handbook of personality: Theory and research, chapter A five-factor theory of personality, pages 139–154. Guilford, New York, 2nd edition, 1999.
John McHugh. Intrusion and intrusion detection. International Journal of Information Security, 1(1):14–35, 2001.
Pointsec Mobile Technologies. Half of all corporate PDAs unprotected despite employer risk. Pointsec News Letter 2, Available from http://www.pointsec.com/news/news_pressroom.asp (read 25.04.2005), June 2004.
Joseph R. Royce and Arnold Powell. Theory of personality and individual differences: factors, systems and processes. Englewood Cliffs, NJ: Prentice Hall, 1983.
Jake Ryan, Meng-Jang Lin, and Risto Miikkulainen. Intrusion detection with neural networks. In Michael I. Jordan, Michael J. Kearns, and Sara A. Solla, editors, Advances in Neural Information Processing Systems, pages 943–949, Cambridge, MA, USA, 1998. The MIT Press.
Karlton Sequeira and Mohammed Zaki. ADMIT: anomaly-based data mining for intrusions. In David Hand, Daniel Keim, and Raymond Ng, editors, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 386–395, Edmonton, Alberta, Canada, 2002. ACM Press.
Jude Shavlik and Mark Shavlik. Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage. In Proceedings of the 2004 ACM SIGKDD international conference on Knowledge discovery and data mining, pages 276–285. ACM Press, 2004.
Bo Sun, Fei Yu, Kui Wu, and Victor C. M. Leung. Mobility-based anomaly detection in cellular mobile networks. In Markus Jakobsson and Adrian Perrig, editors, Proceedings of the 2004 ACM workshop on Wireless security, pages 61–69. ACM Press, 2004.
A. Sundaram. An introduction to intrusion detection. ACM Crossroads, 2(4):3–7, 1996.
S. Upadhyaya, R. Chinchani, and K. Kwiat. An analytical framework for reasoning about intrusions. In 20th IEEE Symposium on Reliable Distributed Systems pages 99–108, New Orleans, LA, October 2001.
Dit-Yan Yeung and Yuxin Ding. Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition, 36(l):229–243, 2003.
Yongguang Zhang and Wenke Lee. Intrusion detection techniques for mobile wireless networks. Wireless Networks, 9(5):545–556, 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this paper
Cite this paper
Mazhelis, O., Puuronen, S. (2005). Characteristics and Measures for Mobile-Masquerader Detection. In: Dowland, P., Furnell, S., Thuraisingham, B., Wang, X.S. (eds) Security Management, Integrity, and Internal Control in Information Systems. IICIS 2004. IFIP International Federation for Information Processing, vol 193. Springer, Boston, MA. https://doi.org/10.1007/0-387-31167-X_20
Download citation
DOI: https://doi.org/10.1007/0-387-31167-X_20
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-29826-9
Online ISBN: 978-0-387-31167-8
eBook Packages: Computer ScienceComputer Science (R0)