Advertisement

A Study on Mobile Cloud Anomaly Detection Model

  • Hyung-Jong Kim
  • Ji-Yeon Kim
  • JinHyung Kim
  • Dal-Nim Choi
  • Jeong Wook Kim
  • HyunCheol Jeong
Conference paper
Part of the Proceedings in Information and Communications Technology book series (PICT, volume 4)

Abstract

The mobile cloud service is inevitable alternative which provides mobile device users with high computing power and large storage. The cloud servers provide various services such as IaaS, PaaS and SaaS to mobile device users seamlessly and the situation means that the device’s apps or mobile browser can interact with the VMs in clouds at anytime and anyplace. In this mobile cloud environment, our concern is the abnormal access of cloud resources. Since the users of cloud services pay based on the usage of the cloud resources, if there are a certain kind of malicious access to the cloud resources, it can cause financial damages to mobile cloud users. Especially, the mobile devices are always turned on, even if we are moving around the street. Thus the malicious behavior of mobile device can do more harm to users compared to PC-based cloud services. This research suggests an anomaly detection model in mobile cloud services. In our suggested model, the users’ behavior and resource usages are considered and the model contains the usual behaviors and resource usages as the users’ profile which is supposed to be compared with the current users’ behavior for detecting the abnormalities. The research result gives insight to security managers about monitoring factors and recognizing the anomaly in the mobile cloud service.

Keywords

Mobile Device Virtual Machine Cloud Service Access Network Anomaly Detection 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Chun, B.-G., Maniatis, P.: Augmented Smartphone Applications Through Clone Cloud Execution. In: Proceedings of the 8th Workshop on Hot Topics in Operating Systems, HotOS (2009)Google Scholar
  2. 2.
    Balakrishnan, M., Mohomed, I., Ramasubramanian, V.: Where’s that Phone?: Geolo-catingIP Addresses on 3G Networks. In: Proceedings of IMC (2009)Google Scholar
  3. 3.
    Wojtczuk, R.: Adventures with a certain Xen vulnerability. Technical Report, Invisible Things Lab (2008)Google Scholar
  4. 4.
    Rutkowska, J.: Security challenges in virtualized environments (April 2008), http://www.invisiblethingslab.com
  5. 5.
    Criscione, C.: Virtually Pwned Pentesting Virtualization. In: BlackHat Conference, USA (2010)Google Scholar

Copyright information

© Springer Tokyo 2012

Authors and Affiliations

  • Hyung-Jong Kim
    • 1
  • Ji-Yeon Kim
    • 1
  • JinHyung Kim
    • 1
  • Dal-Nim Choi
    • 1
  • Jeong Wook Kim
    • 2
  • HyunCheol Jeong
    • 2
  1. 1.Department of Information SecuritySeoul Women’s UniversitySeoulKorea
  2. 2.Security R&D TeamKorea Internet & Security AgencySeoulKorea

Personalised recommendations