Smartphones have become a popular and an
imperative form of mobile computing devices. With the
proliferation of smartphones however, the security threats have
correspondingly increased. Although, some form of security
mechanisms like authentication and encryption have been
provided on platforms such as Android and iOS, these alone
cannot mitigate all the forms of threats. Malwares for
smartphones is also on the rise and pose a grave security threat.
Hence the need for an intrusion detection system for smartphones
has become immensely important. This paper aims to discuss the
current trends in intrusion detection mechanisms for
smartphones. The important features that such a system should
have are network traffic monitoring, classification of the packets
and reporting to the user in the event of an attack. Further, we
expound on the types of an IDS and explore its features in detail.
The open issues concerning the implementation of IDS have also
been discussed.
Chani Jindal : is currently pursuing her B.E.(Computer
Engineering) degree from MIT College of Engineering, India. Her research interests include data mining and networking.
Mukti Chowkwale : is currently pursuing her B.E.(Computer
Engineering) degree from MIT College of Engineering, India.
Her research interests include machine learning, data mining
and information security.
Rohan Shethia : is currently pursuing his B.E.(Computer
Engineering) degree from MIT College of Engineering, India. His
research interests include information security and networking.
Sohail Ahmed Shaikh : is currently pursuing his B.E.(Computer
Engineering) degree from MIT College of Engineering, India. His
research interests include information security, networking,
artificial intelligence and nanotechnology.
Intrusion Detection Systems
Android
Information Security
Machine Learning
In this paper, we have discussed the basics of intrusion
detection and prevention systems, taking into account the
different types and the performance measures. A generic
architecture of IDS has also been provided. A brief
description of the types of attacks has been stated. We also
present a review of recent works on the different
approaches of IDS for smartphones.Finally, the open
issues related to the implementation of IDS have been
accounted.
[1] DimitriosDamopoulos, “Intrusion Detection and
Prevention Systems for Mobile Devices: Design and
Development,”Ph.D. Thesis, Dept. of Information and
Communication Systems Engineering, University of
the Aegean, Greece, 2013
[2] McHugh, John, Alan Christie, and Julia Allen. "The
role of intrusion detection systems." Washington Post
(2000)
[3] V. Jyothsna,V. V. Rama Prasad,”A Review of
Anomaly based Intrusion Detection Systems.”
International Journal of Computer Applications (0975
– 8887)Volume 28– No.7, September 2011
[4] Herve Debar, Marc Dacier, Andreas Wespi, “Towards
a taxonomy of intrusion-detection systems,” in
Computer Networks, vol. 31, Elsevier, 1999, pp. 802-
822
[5] Sanchez, Jaime. Building an Android IDS on Network
Level. DEFCON 21, 2013
[6] Adigun, AbimbolaAdebisi, Temitayo Matthew
Fagbola, and AdekanmiAdegun. "SwarmDroid: Swarm
Optimized Intrusion Detection System for the Android
Mobile Enterprise." International Journal of Computer
Science Issues (IJCSI)11, no. 3 (2014).
[7] AsafShabtai, Uri Kanonov, Yuval Elovici,
ChananGlezer, and Yael Weiss. “Andromaly: a
behavioral malware detection framework for android
devices”. Journal of Intelligent Information Systems,
pages 1–30, 2011. 10.1007/s10844-010-0148-x.
[8] Dini, Gianluca, Fabio Martinelli, Andrea Saracino, and
Daniele Sgandurra. "Madam: a multi-level anomaly
detector for android malware." In Computer Network
Security, pp. 240-253.Springer Berlin Heidelberg,
2012.
[9] Tavallaee, Mahbod, EbrahimBagheri, Wei Lu, and Ali-
A. Ghorbani. "A detailed analysis of the KDD CUP 99
data set." In Proceedings of the Second IEEE
Symposium on Computational Intelligence for Security
and Defence Applications 2009. 2009.
[10] Matthews, Melantha (2011). “Network Security
Attack: Active/Passive Comparison” [Online]
Available: http://www.brighthub.com/computing/smbsecurity/
articles/104551.aspx
[11] Kemmerer, Richard A., and Giovanni Vigna. "Intrusion
detection: A brief history and overview (supplement to
computer magazine)." Computer 35.4 (2002): 27-30.
[12] Gordeev, Mikhail (2000). “Intrusion Detection:
Techniques and Approaches,” [Online] Available:
http://www.forumintrusion.
com/archive/Intrusion%20Detection%20Tech
niques%20and%20Approaches.html
[13] Roesch, Martin. "Snort: Lightweight Intrusion
Detection for Networks." LISA. Vol. 99. 1999.
[14] S. Axelsson. “Intrusion detection systems: A survey
and taxonomy.” Technical Report 99-15, Chalmers
Univ., March 2000.
[15] Fangfang Yuan, LidongZhai, Yanan Cao and Li Guo,
“Research of Intrusion Detection System on Android”,
in IEEE Ninth World Congress on Services, 2013
[16] International Data Corporation. (2014). Worldwide
Smartphone Shipments Q2 2014 [Online] Available:
http://www.idc.com/getdoc.jsp?containerId=prUS2503
7214
[17] Wu, Shelly Xiaonan, and Wolfgang Banzhaf. "The use
of computational intelligence in intrusion detection
systems: A review." Applied Soft Computing 10, no. 1
(2010): 1-35.
[18] Sherif, Joseph S., and Tommy G. Dearmond. "Intrusion
detection: systems and models." In 2012 IEEE 21st
International Workshop on Enabling Technologies:
Infrastructure for Collaborative Enterprises, pp. 115-
115. IEEE Computer Society, 2002.
[19] Mukkamala, S., A. H. Sung, and A. Abraham.
"Designing Intrusion Detection Systems:
Architectures." Challenges and Perspectives (2003).
[20] Gupta, Kapil Kumar. “Robust and efficient intrusion
detection systems.”, Ph.D. Thesis, Department of
Computer Science and Software Engineering,
University of Melbourne, 2009.
[21] Kou, Xiaoming, and Qiaoyan Wen. "Intrusion
detection model based on android." In Broadband
Network and Multimedia Technology (IC-BNMT),
2011 4th IEEE International Conference on, pp. 624-
628. IEEE, 2011.