Smartphone nabbing: Analysis of intrusion detection and prevention systems

In the past few years, the usage of Smartphones has increased at exponential rates. The pace of change in the smartphone market is astounding with the advent of new technologies and features that are changing the way we perceive these handheld devices. People are becoming more and more dependent on their Smartphones for activities such as sending mails, browsing the internet, performing online transactions, social networking, online shopping, paying various bills etc. While on one hand we have numerous advantages of Smartphones, on the other hand we have a lot of mobile phone intrusions, malwares, and attacks to deal with. Most of the threats are caused due to malicious applications that are installed by the users due to their unawareness regarding mobile security. It is a known fact that the smartphones have limited computational power to execute highly complex algorithms in order to perform various intrusion detection mechanisms. Hence the notions of information security need to be incorporated in these devices as well. In this paper we have performed an analysis on the existing methods of intrusion detection for securing our Smartphones. The paper also discusses various mobile malwares and the reasons to secure our Smartphones.

[1]  Ali A. Ghorbani,et al.  Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones , 2014 .

[2]  Qiaoyan Wen,et al.  Intrusion detection model based on Android , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.

[3]  Namitha Jacob Intrusion Detection in Cloud for Smart Phones , 2013 .

[4]  Yuval Elovici,et al.  “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.

[5]  Ahmed Patel,et al.  A survey of intrusion detection and prevention systems , 2010, Inf. Manag. Comput. Secur..

[6]  J. Thangakumar,et al.  A cloud-based intrusion detection system for Android smartphones , 2012, 2012 International Conference on Radar, Communication and Computing (ICRCC).

[7]  Sahin Albayrak,et al.  Smartphone malware evolution revisited: Android next target? , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).

[8]  Sahin Albayrak,et al.  Static Analysis of Executables for Collaborative Malware Detection on Android , 2009, 2009 IEEE International Conference on Communications.

[9]  Yuval Elovici,et al.  Applying Behavioral Detection on Android-Based Devices , 2010, MOBILWARE.

[10]  Juan E. Tapiador,et al.  Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.

[11]  Latifur Khan,et al.  A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.

[12]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[13]  Manoj Kumar,et al.  Comprehensive Study of Cloud Computing and Related Security Issues , 2018 .

[14]  Yajin Zhou,et al.  Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.

[15]  William Enck,et al.  Defending Users against Smartphone Apps: Techniques and Future Directions , 2011, ICISS.

[16]  Xuxian Jiang,et al.  Design and implementation of an Android host-based intrusion prevention system , 2014, ACSAC.

[17]  Max Landman Managing smart phone security risks , 2010, InfoSecCD.

[18]  Saman A. Zonouz,et al.  A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).

[19]  Dae-Ki Kang,et al.  Performance analysis of intrusion detection systems for Smartphone security enhancements , 2011, International Conference on Mobile IT Convergence.

[20]  Guo,et al.  Smart-Phone Attacks and Defenses Chuanxiong , 2004 .