NEMESYS: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

As a consequence of the growing popularity of smart mobile devices, mobile malware is clearly on the rise, with attackers targeting valuable user information and exploiting vulnerabilities of the mobile ecosystems. With the emergence of large-scale mobile botnets, smartphones can also be used to launch attacks on mobile networks. The NEMESYS project will develop novel security technologies for seamless service provisioning in the smart mobile ecosystem, and improve mobile network security through better understanding of the threat landscape. NEMESYS will gather and analyze information about the nature of cyber-attacks targeting mobile users and the mobile network so that appropriate counter-measures can be taken. We will develop a data collection infrastructure that incorporates virtualized mobile honeypots and a honeyclient, to gather, detect and provide early warning of mobile attacks and better understand the modus operandi of cyber-criminals that target mobile devices. By correlating the extracted information with the known patterns of attacks from wireline networks, we will reveal and identify trends in the way that cyber-criminals launch attacks against mobile devices.

[1]  Ravishankar Borgaonkar,et al.  Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications , 2012, NDSS.

[2]  Collin Mulliner,et al.  Nomadic Honeypots : A Novel Concept for Smartphone Honeypots , 2013 .

[3]  Matthias Lange,et al.  Android Security, Pitfalls and Lessons Learned , 2013, ISCIS.

[4]  E. Gelenbe Search in unknown random environments. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.

[5]  Erol Gelenbe,et al.  Disruption tolerant communications for large scale emergency evacuation , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[6]  Madalina Baltatu,et al.  NEMESYS: First Year Project Experience in Telecom Italia Information Technology , 2013, ISCIS.

[7]  Erol Gelenbe,et al.  Opportunistic Communications for Emergency Support Systems , 2011, ANT/MobiWIS.

[8]  Dimitrios Tzovaras,et al.  Towards Visualizing Mobile Network Data , 2013, ISCIS.

[9]  P C LeePatrick,et al.  On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009 .

[10]  Marc Dacier,et al.  SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models , 2008, 2008 Seventh European Dependable Computing Conference.

[11]  Tom Martin,et al.  Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.

[12]  Thomas F. La Porta,et al.  On cellular botnets: measuring the impact of malicious devices on a cellular network core , 2009, CCS.

[13]  E. Gelenbe,et al.  Time and energy in team-based search , 2013 .

[14]  Steve Hanna,et al.  A survey of mobile malware in the wild , 2011, SPSM '11.

[15]  Patrick P. C. Lee,et al.  On the detection of signaling DoS attacks on 3G/WiMax wireless networks , 2009, Comput. Networks.

[16]  Erol Gelenbe,et al.  Steps toward self-aware networks , 2009, CACM.

[17]  Erol Gelenbe,et al.  Natural Computation , 2012, Comput. J..

[18]  Erol Gelenbe,et al.  A self-aware approach to denial of service defence , 2007, Comput. Networks.

[19]  David García,et al.  Infrastructure for Detecting Android Malware , 2013, ISCIS.

[20]  Erol Gelenbe,et al.  Large scale simulation for human evacuation and rescue , 2012, Comput. Math. Appl..

[21]  Erol Gelenbe,et al.  Task Assignment and Transaction Clustering Heuristics for Distributed Systems , 1997, Inf. Sci..

[22]  Steffen Liebergeld,et al.  Android Security , Pitfalls , Lessons Learned and BYOD Technical report , 2013 .

[23]  Erol Gelenbe,et al.  Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach , 2013, ISCIS.

[24]  Erol Gelenbe,et al.  Emergency Cyber-Physical-Human Systems , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[25]  Erol Gelenbe,et al.  Intelligent Navigation Systems for Building Evacuation , 2011, ISCIS.

[26]  Erol Gelenbe,et al.  Probabilistic models of computer systems—Part I (exact results) , 1976, Acta Informatica.

[27]  Thomas C. Schmidt,et al.  Design, Implementation, and Operation of a Mobile Honeypot , 2013, ArXiv.

[28]  Yajin Zhou,et al.  Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.

[29]  Erol Gelenbe,et al.  Random Neural Networks with Multiple Classes of Signals , 1999, Neural Computation.

[30]  Marco Cova,et al.  HARMUR: storing and analyzing historic data on malicious domains , 2011, BADGERS '11.