Abstract
New security threats emerge against mobile devices as the devices’ computing power and storage capabilities evolve. Preventive mechanisms like authentication, encryption alone are not sufficient to provide adequate security for a system. In this work, we propose User Group Partition Algorithm and Behavior Pattern Matching Algorithm to extract anomalous calls from mobile call detail records effectively. The system accepts the proper input of normal mobile phone call detail records as training dataset and fraud mobile phone call detail records as testing dataset. Two main processes are included in this system: grouping mobile phone calls in training dataset according to similar phone call patterns and matching the new input mobile phone call detail records with grouped mobile phone call patterns to examine the input mobile phone call detail record is normal or not. If the system detects the anomalous mobile phone behavior, the system warns the user that the suspicious mobile phone call is detected and asks the user which action will be taken.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Artail, A.H., Raydan, M.: Device-aware desktop web page transformation for rendering on handhelds. Personal and Ubiquitous Computing 9(6), 368–380 (2005). doi:10.1007/s00779-005-0348-5
Chow, G.W., Jones, A.: A framework for anomalydetection in OKL4-linux based smartphones. In: Proceedings of the 6th Australian Information Security Management Conference (2008)
Sun, B., Chen, Z., Wang, R., Yu, F., Leung, V.C.M.: Towards adaptive anomaly detection in cellular mobile networks. In: Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC 2006), vol. 2, pp. 666–670 (2006)
Sun, B., Xiao, Y., Wu, K.: Intrusion Detection in Cellular Mobile Networks. Book chapter in Wireless Mobile Network Security, pp. 183–210. Springer (2007). ISBN: 0387280405
Naumann, I., Hogben, G., Fritsch, L., Benito, R., Dean, R.: Security Issues in the Context of Authentication Using Mobile Devices (Mobile eID). European Network and information Security Agency (ENISA), January (2008)
GSM. World Mobile. Market Data Summary (Q22009). http://www.gsmworld.com/newsroom/market-ata/market_data_summary.htm (accessed 16 Feb. 2011)
Mobile World Congress. Visit Kaspersky Lab at Mobile World Congress 2009 in Barcelona. http://www.kaspersky.com/news?id=207575745 (accessed 16 Feb. 2011)
Landesman, M.: The World’s Largest Security Analysis of Real-World Web Traffic, Annual Global Threat Report, ScanSafe STAT. http://www.scansafe.com/downloads/gtr/2009_AGTR.pdf (accessed 16 Feb. 2011)
Ray, B.: Home Office discusses thief-proof phones. http://www.theregister.co.uk/2007/05/25/home_office_phone_crime (accessed 16 Feb. 2011)
Kruegel, C., Valeur, F., Vigna, G.: Intrusion Detection and Correlation: Challenges and Solutions. Book chapter Computer security and Intrusion Detection. Springer (2005)
Singh, K.K.: Hybrid Profiling Strategy for Intrusion Detection, Department of Computer Science. University of British Columbia (2004)
Moreau, Y., Verrelst, H., Vandewalle, J.: Detection of mobile phone fraud using supervised neural networks: a first prototype. In: Gerstner, W., Hasler, M., Germond, A., Nicoud, J.-D. (eds.) ICANN 1997. LNCS, vol. 1327, pp. 1065–1070. Springer, Heidelberg (1997)
Buschkes, D., Kesdogan, R., Reichl, P.: How to increase security in mobile networks by anomaly detection. In: Proceedings of the Computer Security Applications Conference, Phoenix, pp. 3–12, December 1998
Boukerche, A., Notare, M.S.M.A.: Behavior-Based Intrusion Detection in Mobile Phone Systems. Journal Of Parallel and Distributed Computing 62(9), 1476–1490 (2002)
Hollmén, J.: User profiling and classification for fraud detection in mobile communications networks, PhD Thesis, Helsinki University of Technology (2000)
Burge, P., Shawe-Tylor, J.: An unsupervised neural network approach profiling the behavior of mobile phone users for use in fraud detection. Journal of Parallel and Distributed Computing 61(7), 915–925 (2001)
Sun, B., Yu, F., Wu, K., Leung,V.C.M.: Mobilitybased anomaly detection in cellular mobile networks. In: Proceedings of the ACM Wireless Security (WiSe 2004), Philadelphia, PA, pp. 61–69 (2004)
Kumpulainen, P., Htnen, K.: Anomaly Detection Algorithm Test Bench for Mobile Network Management. Tampere University of Technology (2008)
Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), USA, June 2008
Liu, L., Yan, G., Zhang, X., Chen, S.: VirusMeter: preventing your cellphone from spies. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 244–264. Springer, Heidelberg (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Ko, M.M., Su Thwin, M.M. (2016). Anomalous Behavior Detection in Mobile Network. In: Zin, T., Lin, JW., Pan, JS., Tin, P., Yokota, M. (eds) Genetic and Evolutionary Computing. GEC 2015. Advances in Intelligent Systems and Computing, vol 388. Springer, Cham. https://doi.org/10.1007/978-3-319-23207-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-23207-2_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-23206-5
Online ISBN: 978-3-319-23207-2
eBook Packages: EngineeringEngineering (R0)