Towards energy-aware intrusion detection systems on mobile devices

This paper investigates the correlations between the energy consumption of Android devices and the presence of threats (e.g. battery-drain attacks). In particular, this paper proposes a model for the energy consumption of single hardware components of a mobile device during normal usage and under attack. The model has been implemented in a kernel module and used to build up an energetic signature of both legal and malicious behaviors of WiFi hardware component in different Android devices. Such activity allows us to build a tentative database of signatures that can be used to detect attacks by means of the actual energy consumption of a mobile device. The proposed power consumption model and kernel module can be applied also to other hardware components, so to obtain very precise energetic signatures.

[1]  Gernot Heiser,et al.  An Analysis of Power Consumption in a Smartphone , 2010, USENIX Annual Technical Conference.

[2]  Ilias Maglogiannis,et al.  Mobile healthcare information management utilizing Cloud Computing and Android OS , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.

[3]  Lei Yang,et al.  Accurate online power estimation and automatic battery behavior based power model generation for smartphones , 2010, 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).

[4]  Sahin Albayrak,et al.  Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..

[5]  Alessandro Armando,et al.  Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) , 2012, SEC.

[6]  Hojung Cha,et al.  AppScope: Application Energy Metering Framework for Android Smartphone Using Kernel Activity Monitoring , 2012, USENIX Annual Technical Conference.

[7]  Nataraj Kuntagod,et al.  Mobile decision support system for outreach health worker , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.

[8]  Simin Nadjm-Tehrani,et al.  Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.

[9]  Kang G. Shin,et al.  Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.

[10]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[11]  Alessio Merlo,et al.  The energy impact of security mechanisms in modern mobile devices , 2012, Netw. Secur..

[12]  S. Zielinski,et al.  International Court of Justice , 2002, International Organization.

[13]  Sahin Albayrak,et al.  An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.

[14]  Alessandro Armando,et al.  An Empirical Evaluation of the Android Security Framework , 2013, SEC.

[15]  Alessio Merlo,et al.  What is Green Security? , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[16]  Jane W.-S. Liu,et al.  Wedjat: A Mobile Phone Based Medicine In-take Reminder and Monitor , 2009, 2009 Ninth IEEE International Conference on Bioinformatics and BioEngineering.

[17]  K.W. Derr,et al.  Nightmares with Mobile Devices are Just around the Corner! , 2007, 2007 IEEE International Conference on Portable Information Devices.

[18]  Lorenzo Chiari,et al.  Smartphone-based applications for investigating falls and mobility , 2011, 2011 5th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.

[19]  Tom Martin,et al.  Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.