Research Article
Monitoring Smartphones for Anomaly Detection
@INPROCEEDINGS{10.4108/ICST.MOBILWARE2008.2492, author={Aubrey-Derrick Schmidt and Frank Peters and Florian Lamour and Sahin Albayrak}, title={Monitoring Smartphones for Anomaly Detection}, proceedings={1st International ICST Conference on Mobile Wireless Middleware, Operating Systems and Applications}, publisher={ICST}, proceedings_a={MOBILWARE}, year={2010}, month={5}, keywords={Monitoring Smartphone Anomaly Detection Mobile Device}, doi={10.4108/ICST.MOBILWARE2008.2492} }
- Aubrey-Derrick Schmidt
Frank Peters
Florian Lamour
Sahin Albayrak
Year: 2010
Monitoring Smartphones for Anomaly Detection
MOBILWARE
ICST
DOI: 10.4108/ICST.MOBILWARE2008.2492
Abstract
In this paper we demonstrate how to monitor a smartphone running Symbian OS in order to extract features that describe the state of the device and can be used for anomaly detection. These features are sent to a remote server, because running a complex intrusion detection system (IDS) on this kind of mobile device still is not feasible, due to capability and hardware limitations. We give examples on how to compute some of the features and introduce the top ten applications used by mobile phone users basing on a study in 2005. The usage of these applications is recorded and visualized and for a first comparison, data results of the monitoring of a simple malware are given.
Copyright © 2008–2024 ICST