Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  A Survey on Intrusion Detection Systems for Android Smartphones  
  Authors : Chani Jindal; Mukti Chowkwale; Rohan Shethia; Sohail Ahmed Shaikh
  Cite as:

 

Smartphones have become a popular and an imperative form of mobile computing devices. With the proliferation of smartphones however, the security threats have correspondingly increased. Although, some form of security mechanisms like authentication and encryption have been provided on platforms such as Android and iOS, these alone cannot mitigate all the forms of threats. Malwares for smartphones is also on the rise and pose a grave security threat. Hence the need for an intrusion detection system for smartphones has become immensely important. This paper aims to discuss the current trends in intrusion detection mechanisms for smartphones. The important features that such a system should have are network traffic monitoring, classification of the packets and reporting to the user in the event of an attack. Further, we expound on the types of an IDS and explore its features in detail. The open issues concerning the implementation of IDS have also been discussed.

 

Published In : IJCSN Journal Volume 3, Issue 5

Date of Publication : October 2014

Pages : 405 - 411

Figures : 01

Tables : --

Publication Link : A Survey on Intrusion Detection Systems for Android Smartphones

 

 

 

Chani Jindal : is currently pursuing her B.E.(Computer Engineering) degree from MIT College of Engineering, India. Her research interests include data mining and networking.

Mukti Chowkwale : is currently pursuing her B.E.(Computer Engineering) degree from MIT College of Engineering, India. Her research interests include machine learning, data mining and information security.

Rohan Shethia : is currently pursuing his B.E.(Computer Engineering) degree from MIT College of Engineering, India. His research interests include information security and networking.

Sohail Ahmed Shaikh : is currently pursuing his B.E.(Computer Engineering) degree from MIT College of Engineering, India. His research interests include information security, networking, artificial intelligence and nanotechnology.

 

 

 

 

 

 

 

Intrusion Detection Systems

Android

Information Security

Machine Learning

In this paper, we have discussed the basics of intrusion detection and prevention systems, taking into account the different types and the performance measures. A generic architecture of IDS has also been provided. A brief description of the types of attacks has been stated. We also present a review of recent works on the different approaches of IDS for smartphones.Finally, the open issues related to the implementation of IDS have been accounted.

 

 

 

 

 

 

 

 

 

[1] DimitriosDamopoulos, “Intrusion Detection and Prevention Systems for Mobile Devices: Design and Development,”Ph.D. Thesis, Dept. of Information and Communication Systems Engineering, University of the Aegean, Greece, 2013 [2] McHugh, John, Alan Christie, and Julia Allen. "The role of intrusion detection systems." Washington Post (2000) [3] V. Jyothsna,V. V. Rama Prasad,”A Review of Anomaly based Intrusion Detection Systems.” International Journal of Computer Applications (0975 – 8887)Volume 28– No.7, September 2011 [4] Herve Debar, Marc Dacier, Andreas Wespi, “Towards a taxonomy of intrusion-detection systems,” in Computer Networks, vol. 31, Elsevier, 1999, pp. 802- 822 [5] Sanchez, Jaime. Building an Android IDS on Network Level. DEFCON 21, 2013 [6] Adigun, AbimbolaAdebisi, Temitayo Matthew Fagbola, and AdekanmiAdegun. "SwarmDroid: Swarm Optimized Intrusion Detection System for the Android Mobile Enterprise." International Journal of Computer Science Issues (IJCSI)11, no. 3 (2014). [7] AsafShabtai, Uri Kanonov, Yuval Elovici, ChananGlezer, and Yael Weiss. “Andromaly: a behavioral malware detection framework for android devices”. Journal of Intelligent Information Systems, pages 1–30, 2011. 10.1007/s10844-010-0148-x. [8] Dini, Gianluca, Fabio Martinelli, Andrea Saracino, and Daniele Sgandurra. "Madam: a multi-level anomaly detector for android malware." In Computer Network Security, pp. 240-253.Springer Berlin Heidelberg, 2012. [9] Tavallaee, Mahbod, EbrahimBagheri, Wei Lu, and Ali- A. Ghorbani. "A detailed analysis of the KDD CUP 99 data set." In Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009. 2009. [10] Matthews, Melantha (2011). “Network Security Attack: Active/Passive Comparison” [Online] Available: http://www.brighthub.com/computing/smbsecurity/ articles/104551.aspx [11] Kemmerer, Richard A., and Giovanni Vigna. "Intrusion detection: A brief history and overview (supplement to computer magazine)." Computer 35.4 (2002): 27-30. [12] Gordeev, Mikhail (2000). “Intrusion Detection: Techniques and Approaches,” [Online] Available: http://www.forumintrusion. com/archive/Intrusion%20Detection%20Tech niques%20and%20Approaches.html [13] Roesch, Martin. "Snort: Lightweight Intrusion Detection for Networks." LISA. Vol. 99. 1999. [14] S. Axelsson. “Intrusion detection systems: A survey and taxonomy.” Technical Report 99-15, Chalmers Univ., March 2000. [15] Fangfang Yuan, LidongZhai, Yanan Cao and Li Guo, “Research of Intrusion Detection System on Android”, in IEEE Ninth World Congress on Services, 2013 [16] International Data Corporation. (2014). Worldwide Smartphone Shipments Q2 2014 [Online] Available: http://www.idc.com/getdoc.jsp?containerId=prUS2503 7214 [17] Wu, Shelly Xiaonan, and Wolfgang Banzhaf. "The use of computational intelligence in intrusion detection systems: A review." Applied Soft Computing 10, no. 1 (2010): 1-35. [18] Sherif, Joseph S., and Tommy G. Dearmond. "Intrusion detection: systems and models." In 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 115- 115. IEEE Computer Society, 2002. [19] Mukkamala, S., A. H. Sung, and A. Abraham. "Designing Intrusion Detection Systems: Architectures." Challenges and Perspectives (2003). [20] Gupta, Kapil Kumar. “Robust and efficient intrusion detection systems.”, Ph.D. Thesis, Department of Computer Science and Software Engineering, University of Melbourne, 2009. [21] Kou, Xiaoming, and Qiaoyan Wen. "Intrusion detection model based on android." In Broadband Network and Multimedia Technology (IC-BNMT), 2011 4th IEEE International Conference on, pp. 624- 628. IEEE, 2011.