Skip to main content

Masquerade Detection on Mobile Devices

  • Chapter
  • First Online:

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

A masquerade is a type of attack where an intruder attempts to avoid detection by impersonating an authorized user of a system. In this research, we consider the problem of masquerade detection on mobile devices. Specifically, we experiment with a variety of machine learning techniques to determine how accurately we can distinguish mobile users, based on various features. Here, our primary goal is to determine which techniques are most likely to be effective in a more comprehensive masquerade detection system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   59.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Rouse, M. (2007) Network security: Masquerade definition. TechTarget. https://searchsecurity.techtarget.com/definition/masquerade

  2. Huang L, Stamp M (2011) Masquerade detection using profile hidden Markov models. Computers and Security 30(8):732–747. https://doi.org/10.1016/j.cose.2011.08.003

  3. Bertacchini M, Fierens P (2009) A survey on masquerader detection approaches. In: Proceedings of V Congreso Iberoamericano de Seguridad Informática. Universidad de la República de Uruguay, pp 46–60

    Google Scholar 

  4. Whitney, L (2017) Mobile device authentication a look at behavior-based authentication. cnet news

    Google Scholar 

  5. Elinor, M (2011) More malware targeting android. cnet news. https://www.cnet.com/news/more-malware-targeting-android/

  6. Whitney, L (2011) Android malware masquerading as Google+ app. cnet news

    Google Scholar 

  7. Stamp M (2017) Introduction to machine learning with applications in information security. CRC Press

    Google Scholar 

  8. Deutschmann I, Nordström P, Nilsson L (2013) Continuous authentication using behavioral biometrics. IT Prof 15(4):12–15. https://doi.org/10.1109/MITP.2013.50

  9. Lunt TF, Jagannathan R (1988) A prototype real-time intrusion-detection expert system. Proceedings of the 1988 IEEE symposium on security and privacy, pp 59–66. https://doi.org/10.1109/SECPRI.1988.8098

  10. Burguera I, Zurutuza U, Nadjm-Tehrani S (2011) Crowdroid: behavior-based malware detection system for android. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices. SPSM ’11. ACM, USA, pp 15–26. https://doi.org/10.1145/2046614.2046619

  11. Christodorescu M, Jha S, Kruegel C (2007) Mining specifications of malicious behavior. In: Proceedings of the the 6th joint meeting of the european software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering. ESEC-FSE ’07. ACM, USA, pp 5–14. https://doi.org/10.1145/1287624.1287628

  12. Lanzi A, Balzarotti D, Kruegel C, Christodorescu M, Kirda E (2010) Accessminer: using system-centric models for malware protection. In: Proceedings of the 17th ACM conference on computer and communications security.CCS ’10. ACM, USA, pp 399–412. https://doi.org/10.1145/1866307.1866353

  13. Bose A, Hu X, Shin K, Park GT (2008) Behavioral detection of malware on mobile handsets. In: Proceedings of the 6th international conference on mobile systems, applications, and services. MobiSys ’08. ACM, USA, pp 225–238. https://doi.org/10.1145/1378600.1378626

  14. Comparetti PM, Salvaneschi G, Kirda E, Kolbitsch C, Kruegel C, Zanero S (2010) Identifying dormant functionality in malware programs. In: Proceedings of the 2010 IEEE symposium on security and privacy. SP ’10. IEEE Computer Society, USA. https://doi.org/10.1109/SP.2010.12

  15. Zhang Y, Yang M, Xu B, Yang Z, Gu G, Ning P, Wang XS, Zang B (2013) Vetting undesirable behaviors in Android apps with permission use analysis. In: Proceedings of the 2013 ACM SIGSAC conference on computer and communications security. CCS ’13. ACM, USA, pp 611–622. https://doi.org/10.1145/2508859.2516689

  16. Li F, Clarke N, Papadaki M, Dowland P (2010) Behaviour profiling on mobile devices. In: 2010 International conference on emerging security technologies, pp 77–82. https://doi.org/10.1109/EST.2010.26

  17. Seleznyov A, Mazhelis O (2002) Learning temporal patterns for anomaly intrusion detection. In: Proceedings of the 2002 ACM symposium on applied computing. SAC ’02. ACM, USA, pp 209–213. https://doi.org/10.1145/508791.508836

  18. Abdulaziz AA, Swarup R, Jugal K (2017) Ranking most informative apps for effective identification of legitimate smartphone owners. In: Proceedings IEEE international conference on computer communications (INFOCOM 2017). MobiSec ’17. IEEEXplore, USA. http://www.cs.uccs.edu/~jkalita/papers/2017/AbdulazizAlzubaidiMobiSec2017.pdf

  19. Lamba H, Glazier TJ, Cámara J, Schmerl B, Garlan D, Pfeffer J (2017) Model-based cluster analysis for identifying suspicious activity sequences in software. In: Proceedings of the 3rd ACM on international workshop on security and privacy analytics. IWSPA ’17. ACM, USA, pp 17–22. https://doi.org/10.1145/3041008.3041014

  20. Maxion RA, Townsend TN (2002) Masquerade detection using truncated command lines. In: Proceedings of the 2002 international conference on dependable systems and networks. DSN ’02. IEEE Computer Society, USA, pp 219–228 http://dl.acm.org/citation.cfm?id=647883.738240

  21. Michalopoulos DS, Clarke NL (2006) Intrusion detection system for mobile devices. Adv Netw Comput Commun 205–212

    Google Scholar 

  22. Samfat D, Molva R (1997) IDAMN: an intrusion detection architecture for mobile networks. IEEE J Sel Areas Commun 15:1373–1380

    Google Scholar 

  23. Buschkes R, Kesdogan D, Reichl P (1998) How to increase security in mobile networks by anomaly detection. Proceedings of the 14th annual computer security applications conference. pp 23–12

    Google Scholar 

  24. Boukerche A, Nitare MSMA (2002) Behavior-based intrusion detection in mobile phone systems. J Parallel Distr Com 62:1476–1490

    Google Scholar 

  25. Sun B, Yu F, Wu K, Leung VCM (2004) Mobility-based anomaly detection in cellular mobile networks. Proceedings of ACM wireless security (WiSe’ 04), Philadelphia, PA. pp 61–69

    Google Scholar 

  26. Eagle N, Pentland A, Lazer D (2009) Inferring friendship network structure by using mobile phone data. Proc Natl Acad Sci 106(36):15274–15278

    Google Scholar 

  27. Trevor H, Robert T, Jerome F (2009) The elements of statistical learning: data mining, inference, and prediction, 3rd edn. Springer, Berlin

    Google Scholar 

  28. Johnson R, Zhang T (2014) Learning nonlinear functions using regularized greedy forest. IEEE Trans Pattern Anal Mach Intell 36(5):942–954. https://doi.org/10.1109/TPAMI.2013.159

  29. Rojas R (2009) AdaBoost and the Super Bowl of classifiers: a tutorial introduction to adaptive boosting. http://www.inf.fu-berlin.de/inst/ag-ki/adaboost4.pdf

  30. Stamp M (2017) Boost your knowledge of AdaBoost. https://www.cs.sjsu.edu/texttildelowstamp/ML/files/ada.pdf

  31. Team AVC (2016) Practical guide to deal with imbalanced classification problems in R. Analytics Vidhya. https://www.analyticsvidhya.com/blog/2016/03/practical-guide-deal-imbalanced-classification-problems/

  32. Vreeken J (2003) Spiking neural networks, an introduction. Technical report, Utrecht University

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mark Stamp .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kadala Manikoth, S.N., Di Troia, F., Stamp, M. (2018). Masquerade Detection on Mobile Devices. In: Parkinson, S., Crampton, A., Hill, R. (eds) Guide to Vulnerability Analysis for Computer Networks and Systems. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-92624-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-92624-7_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-92623-0

  • Online ISBN: 978-3-319-92624-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics