Research of Intrusion Detection System on Android

In this paper, we proposed an intrusion detection system for detecting anomaly on Android smartphones. The intrusion detection system continuously monitors and collects the information of smartphone under normal conditions and attack state. It extracts various features obtained from the Android system, such as the network traffic of smartphones, battery consumption, CPU usage, the amount of running processes and so on. Then, it applies Bayes Classifying Algorithm to determine whether there is an invasion. In order to further analyze the Android system abnormalities and locate malicious software, along with system state monitoring the intrusion detection system monitors the process and network flow of the smartphone. Finally, experiments on the system which was designed in this paper have been carried out. Empirical results suggest that the proposed intrusion detection system is effective in detecting anomaly on Android smartphones.

[1]  Yuval Elovici,et al.  “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.

[2]  Simin Nadjm-Tehrani,et al.  Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.

[3]  Jingyu Hua,et al.  A SMS-Based Mobile Botnet Using Flooding Algorithm , 2011, WISTP.

[4]  Pedro M. Domingos,et al.  On the Optimality of the Simple Bayesian Classifier under Zero-One Loss , 1997, Machine Learning.

[5]  Markus Miettinen,et al.  Host-Based Intrusion Detection for Advanced Mobile Devices , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[6]  Jörg Widmer,et al.  Survey on Energy Consumption Entities on the Smartphone Platform , 2011, 2011 IEEE 73rd Vehicular Technology Conference (VTC Spring).

[7]  Nathaniel Husted,et al.  Smartphone security limitations: conflicting traditions , 2011, GTIP '11.

[8]  Elliot Maxwell,et al.  Open Standards, Open Source, and Open Innovation: Harnessing the Benefits of Openness , 2006, Innovations: Technology, Governance, Globalization.

[9]  Sahin Albayrak,et al.  Enhancing security of linux-based android devices , 2008 .

[10]  Joseph L. Hellerstein,et al.  Recognizing End-User Transactions in Performance Management , 2000, AAAI/IAAI.

[11]  Reid G. Simmons,et al.  Smartphone Interruptibility Using Density-Weighted Uncertainty Sampling with Reinforcement Learning , 2011, 2011 10th International Conference on Machine Learning and Applications and Workshops.