1st International ICST Conference on Mobile Wireless Middleware, Operating Systems and Applications

Research Article

Monitoring Smartphones for Anomaly Detection

Download302 downloads
  • @INPROCEEDINGS{10.4108/ICST.MOBILWARE2008.2492,
        author={Aubrey-Derrick Schmidt and Frank Peters and Florian Lamour and Sahin Albayrak},
        title={Monitoring Smartphones for Anomaly Detection},
        proceedings={1st International ICST Conference on Mobile Wireless Middleware, Operating Systems and Applications},
        publisher={ICST},
        proceedings_a={MOBILWARE},
        year={2010},
        month={5},
        keywords={Monitoring Smartphone Anomaly Detection Mobile Device},
        doi={10.4108/ICST.MOBILWARE2008.2492}
    }
    
  • Aubrey-Derrick Schmidt
    Frank Peters
    Florian Lamour
    Sahin Albayrak
    Year: 2010
    Monitoring Smartphones for Anomaly Detection
    MOBILWARE
    ICST
    DOI: 10.4108/ICST.MOBILWARE2008.2492
Aubrey-Derrick Schmidt1,*, Frank Peters1,*, Florian Lamour1,*, Sahin Albayrak1,*
  • 1: DAI-Labor, Technische Universität Berlin
*Contact email: aubrey.schmidt@dai-labor.de, frank.peters@dai-labor.de, florian.lamour@dai-labor.de, sahin.albayrak@dai-labor.de

Abstract

In this paper we demonstrate how to monitor a smartphone running Symbian OS in order to extract features that describe the state of the device and can be used for anomaly detection. These features are sent to a remote server, because running a complex intrusion detection system (IDS) on this kind of mobile device still is not feasible, due to capability and hardware limitations. We give examples on how to compute some of the features and introduce the top ten applications used by mobile phone users basing on a study in 2005. The usage of these applications is recorded and visualized and for a first comparison, data results of the monitoring of a simple malware are given.