Skip to main content

Anomalous Behavior Detection in Mobile Network

  • Conference paper
  • First Online:
Genetic and Evolutionary Computing (GEC 2015)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 388))

Included in the following conference series:

  • International Conference on Genetic and Evolutionary Computing

Abstract

New security threats emerge against mobile devices as the devices’ computing power and storage capabilities evolve. Preventive mechanisms like authentication, encryption alone are not sufficient to provide adequate security for a system. In this work, we propose User Group Partition Algorithm and Behavior Pattern Matching Algorithm to extract anomalous calls from mobile call detail records effectively. The system accepts the proper input of normal mobile phone call detail records as training dataset and fraud mobile phone call detail records as testing dataset. Two main processes are included in this system: grouping mobile phone calls in training dataset according to similar phone call patterns and matching the new input mobile phone call detail records with grouped mobile phone call patterns to examine the input mobile phone call detail record is normal or not. If the system detects the anomalous mobile phone behavior, the system warns the user that the suspicious mobile phone call is detected and asks the user which action will be taken.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Artail, A.H., Raydan, M.: Device-aware desktop web page transformation for rendering on handhelds. Personal and Ubiquitous Computing 9(6), 368–380 (2005). doi:10.1007/s00779-005-0348-5

    Article  Google Scholar 

  2. Chow, G.W., Jones, A.: A framework for anomalydetection in OKL4-linux based smartphones. In: Proceedings of the 6th Australian Information Security Management Conference (2008)

    Google Scholar 

  3. Sun, B., Chen, Z., Wang, R., Yu, F., Leung, V.C.M.: Towards adaptive anomaly detection in cellular mobile networks. In: Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC 2006), vol. 2, pp. 666–670 (2006)

    Google Scholar 

  4. Sun, B., Xiao, Y., Wu, K.: Intrusion Detection in Cellular Mobile Networks. Book chapter in Wireless Mobile Network Security, pp. 183–210. Springer (2007). ISBN: 0387280405

    Google Scholar 

  5. Naumann, I., Hogben, G., Fritsch, L., Benito, R., Dean, R.: Security Issues in the Context of Authentication Using Mobile Devices (Mobile eID). European Network and information Security Agency (ENISA), January (2008)

    Google Scholar 

  6. GSM. World Mobile. Market Data Summary (Q22009). http://www.gsmworld.com/newsroom/market-ata/market_data_summary.htm (accessed 16 Feb. 2011)

  7. Mobile World Congress. Visit Kaspersky Lab at Mobile World Congress 2009 in Barcelona. http://www.kaspersky.com/news?id=207575745 (accessed 16 Feb. 2011)

  8. Landesman, M.: The World’s Largest Security Analysis of Real-World Web Traffic, Annual Global Threat Report, ScanSafe STAT. http://www.scansafe.com/downloads/gtr/2009_AGTR.pdf (accessed 16 Feb. 2011)

  9. Ray, B.: Home Office discusses thief-proof phones. http://www.theregister.co.uk/2007/05/25/home_office_phone_crime (accessed 16 Feb. 2011)

  10. Kruegel, C., Valeur, F., Vigna, G.: Intrusion Detection and Correlation: Challenges and Solutions. Book chapter Computer security and Intrusion Detection. Springer (2005)

    Google Scholar 

  11. Singh, K.K.: Hybrid Profiling Strategy for Intrusion Detection, Department of Computer Science. University of British Columbia (2004)

    Google Scholar 

  12. Moreau, Y., Verrelst, H., Vandewalle, J.: Detection of mobile phone fraud using supervised neural networks: a first prototype. In: Gerstner, W., Hasler, M., Germond, A., Nicoud, J.-D. (eds.) ICANN 1997. LNCS, vol. 1327, pp. 1065–1070. Springer, Heidelberg (1997)

    Google Scholar 

  13. Buschkes, D., Kesdogan, R., Reichl, P.: How to increase security in mobile networks by anomaly detection. In: Proceedings of the Computer Security Applications Conference, Phoenix, pp. 3–12, December 1998

    Google Scholar 

  14. Boukerche, A., Notare, M.S.M.A.: Behavior-Based Intrusion Detection in Mobile Phone Systems. Journal Of Parallel and Distributed Computing 62(9), 1476–1490 (2002)

    Article  MATH  Google Scholar 

  15. Hollmén, J.: User profiling and classification for fraud detection in mobile communications networks, PhD Thesis, Helsinki University of Technology (2000)

    Google Scholar 

  16. Burge, P., Shawe-Tylor, J.: An unsupervised neural network approach profiling the behavior of mobile phone users for use in fraud detection. Journal of Parallel and Distributed Computing 61(7), 915–925 (2001)

    Article  MATH  Google Scholar 

  17. Sun, B., Yu, F., Wu, K., Leung,V.C.M.: Mobilitybased anomaly detection in cellular mobile networks. In: Proceedings of the ACM Wireless Security (WiSe 2004), Philadelphia, PA, pp. 61–69 (2004)

    Google Scholar 

  18. Kumpulainen, P., Htnen, K.: Anomaly Detection Algorithm Test Bench for Mobile Network Management. Tampere University of Technology (2008)

    Google Scholar 

  19. Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services (MobiSys 2008), USA, June 2008

    Google Scholar 

  20. Liu, L., Yan, G., Zhang, X., Chen, S.: VirusMeter: preventing your cellphone from spies. In: Kirda, E., Jha, S., Balzarotti, D. (eds.) RAID 2009. LNCS, vol. 5758, pp. 244–264. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mon Mon Ko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Ko, M.M., Su Thwin, M.M. (2016). Anomalous Behavior Detection in Mobile Network. In: Zin, T., Lin, JW., Pan, JS., Tin, P., Yokota, M. (eds) Genetic and Evolutionary Computing. GEC 2015. Advances in Intelligent Systems and Computing, vol 388. Springer, Cham. https://doi.org/10.1007/978-3-319-23207-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23207-2_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23206-5

  • Online ISBN: 978-3-319-23207-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics