Towards an Autonomous Host-Based Intrusion Detection System for Android Mobile Devices
In the 5G era, mobile devices are expected to play a pivotal role in our daily life. They will provide a wide range of appealing features to enable users to access a rich set of high quality personalized services. However, at the same time, mobile devices (e.g., smartphones) will be one of the most attractive targets for future attackers in the upcoming 5G communications systems. Therefore, security mechanisms such as mobile Intrusion Detection Systems (IDSs) are essential to protect mobile devices from a plethora of known and unknown security breaches and to ensure user privacy. However, despite the fact that a lot of research effort has been placed on IDSs for mobile devices during the last decade, autonomous host-based IDS solutions for 5G mobile devices are still required to protect them in a more efficient and effective manner. Towards this direction, we propose an autonomous host-based IDS for Android mobile devices applying Machine Learning (ML) methods to inspect different features representing how the device’s resources (e.g., CPU, memory, etc.) are being used. The simulation results demonstrate a promising detection accuracy of above 85%, reaching up to 99.99%.
KeywordsMobile Intrusion Detection System Android Security 5G communications Machine Learning Malware detection Host-based IDS
José Ribeiro would like to acknowledge his PhD grant funded by the Fundação para a Ciência e Tecnologia (FCT-Portugal) with reference SFRH/BD/112755/2015. This work is supported by the European Regional Development Fund (FEDER), through the Regional Operational Programme of Centre (CENTRO 2020) of the Portugal 2020 framework [Project MOBITRUST with Nr. 003343 (CENTRO-01-0247-FEDER-003343)].
- 2.Becher, M., Freiling, F.C., Hoffmann, J., Holtz, T., Uellenbeck, S., Wolf, C.: Mobile security catching up? Revealing the nuts and bolts of the security of mobile devices. In: Security and Privacy (SP), pp. 96–111. IEEE (2011)Google Scholar
- 3.Mantas, G., Komninos, N., Rodriguez, J., Logota, E., Marques, H.: Security for 5G Communications, pp. 207–220. Wiley, Chichester (2015)Google Scholar
- 4.Arabo, A., Pranggono, B.: Mobile malware and smart devices security: trends, challenges and solutions. In: Control Systems and Computer (CSCS), 2013 19th International Conference, pp. 526–531. IEEE (2013)Google Scholar
- 6.Burguera, I., Zurutuza, U., Nadjm-Tehrani, S.: Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 15–26. ACM, October 2011Google Scholar
- 7.Xu, R., Saïdi, H., Anderson, R.: Aurasium: practical policy enforcement for Android applications. In: Proceedings of 21st USENIX Conference on Security Symposium. USENIX Association (2012)Google Scholar
- 8.Borges, P., et al.: Towards a hybrid intrusion detection system for android-based PPDR terminals. In: 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), Lisbon, pp. 1034–1039 (2017)Google Scholar
- 10.Huang, D., Zhang, X., Kang, M., Luo, J.: MobiCloud: building secure cloud framework for mobile computing and communication. In: 2010 Fifth IEEE International Symposium in Service Oriented System Engineering (SOSE), pp. 27–34 (2010)Google Scholar