DocumentCode :
149519
Title :
Robust clustering methods for detecting smartphone´s abnormal behavior
Author :
El Attar, Ali ; Khatoun, Rida ; Birregah, Babiga ; Lemercier, Marc
Author_Institution :
ICD/ERA, Univ. of Technol. of Troyes (UTT), Troyes, France
fYear :
2014
fDate :
6-9 April 2014
Firstpage :
2552
Lastpage :
2557
Abstract :
Smartphones have become increasingly popular, and, nowadays, thanks to the use of 3G networks, the need for connectivity in a business environment is significant. Smartphones provide access to a tremendous amount of sensitive information related to business, such as customer contacts, financial data and Intranet networks. If any of this information were to fall into the hands of hackers, it would be devastating for the company. In this paper, we propose a cluster-based approach to detecting abnormal behaviour in smartphone applications. First we carry out various robust clustering techniques that help to identify and regroup applications that exhibit similar behaviour. The clustering results are then used to define a cluster-based outlier factor for each application, which in turn identifies the top n malware applications. Initial results of the experiments prove the efficiency and accuracy of cluster-based approaches in detecting abnormal smartphone applications and those with a low false-alert rate.
Keywords :
3G mobile communication; invasive software; smart phones; 3G networks; Intranet networks; business environment; cluster-based outlier factor; customer contacts; financial data; hackers; malware; robust clustering methods; smartphone; Batteries; Clustering algorithms; Clustering methods; Malware; Mobile communication; Robustness; Smart phones;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications and Networking Conference (WCNC), 2014 IEEE
Conference_Location :
Istanbul
Type :
conf
DOI :
10.1109/WCNC.2014.6952790
Filename :
6952790
Link To Document :
بازگشت