A Strongly Non-Intrusive Methodology to Monitor and Detect Anomalous Behaviour of Wireless Devices

Abdurhman Albasir, Kshirasagar Naik, Ricardo Manzano, Parth Shah, Nitin Naik

Research output: Chapter in Book/Published conference outputConference publication

Abstract

With the growing popularity and usage of smartphone devices, safeguarding it against malware becomes increasingly essential. In this paper, we define and present a strongly non-intrusive observation method that monitors network traffic data of the device to detect the presence of malware. The proposed method is advantageous as it neither requires any modification to the device, nor it needs any explicit connection between the device and the observing tool. We have evaluated the performance of two anomaly detection techniques, namely, changepoint detection and HOG+CNN, on the observed data. We compared the performance of the two detection techniques using both ordinary non-intrusive power signal data and strongly nonintrusive network traffic data. We also ran experiments to detect once-activated simulated malware and real malware. Validation tests confirm the effectiveness of the methodology in detecting the presence of malware.
Original languageEnglish
Title of host publicationISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings
PublisherIEEE
Pages1-8
ISBN (Electronic)978-1-7281-8602-3
ISBN (Print)978-1-7281-8603-0
DOIs
Publication statusPublished - 4 Dec 2020
Event2020 IEEE International Symposium on Systems Engineering (ISSE) - Vienna, Austria
Duration: 12 Oct 202012 Nov 2020

Publication series

NameISSE 2020 - 6th IEEE International Symposium on Systems Engineering, Proceedings

Conference

Conference2020 IEEE International Symposium on Systems Engineering (ISSE)
Abbreviated titleISSE
Country/TerritoryAustria
CityVienna
Period12/10/2012/11/20

Keywords

  • Anomalous Behavior Detection
  • Deep Learning - CNN
  • Malware Detection
  • Signals Classification

Fingerprint

Dive into the research topics of 'A Strongly Non-Intrusive Methodology to Monitor and Detect Anomalous Behaviour of Wireless Devices'. Together they form a unique fingerprint.

Cite this