Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation

被引:23
作者
Suarez-Tangil, Guillermo [1 ]
Tapiador, Juan E. [1 ]
Peris-Lopez, Pedro [1 ]
Pastrana, Sergio [1 ]
机构
[1] Univ Carlos III Madrid, Dept Comp Sci, COSEC Comp Secur Lab, Madrid 28911, Spain
关键词
Smartphone security; Anomaly detection; Outsourced security; Power consumption;
D O I
10.1016/j.pmcj.2014.10.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many security problems in smartphones and other smart devices are approached from an anomaly detection perspective in which the main goal reduces to identifying anomalous activity patterns. Since machine learning algorithms are generally used to build such detectors, one major challenge is adapting these techniques to battery-powered devices. Many recent works simply assume that on-platform detection is prohibitive and suggest using offloaded (i.e., cloud-based) engines. Such a strategy seeks to save battery life by exchanging computation and communication costs, but it still remains unclear whether this is optimal or not in all circumstances. In this paper, we evaluate different strategies for offloading certain functional tasks in machine learning based detection systems. Our experimental results confirm the intuition that outsourced computation is clearly the best option in terms of power consumption, outweighing on-platform strategies in, essentially, all practical scenarios. Our findings also point out noticeable differences among different machine learning algorithms, and we provide separate consumption models for functional blocks (data preprocessing, training, test, and communications) that can be used to obtain power consumption estimates and compare detectors. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:137 / 151
页数:15
相关论文
共 42 条
  • [1] [Anonymous], MALAYSIAN J COMPUT S
  • [2] [Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
  • [3] Barbera MV, 2013, IEEE INFOCOM SER, P1285
  • [4] Blasing Thomas, 2010, 2010 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), P55, DOI 10.1109/MALWARE.2010.5665792
  • [5] Chun BG, 2011, EUROSYS 11: PROCEEDINGS OF THE EUROSYS 2011 CONFERENCE, P301
  • [6] Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence
    Conti, Marco
    Das, Sajal K.
    Bisdikian, Chatschik
    Kumar, Mohan
    Ni, Lionel M.
    Passarella, Andrea
    Roussos, George
    Troester, Gerhard
    Tsudik, Gene
    Zambonelli, Franco
    [J]. PERVASIVE AND MOBILE COMPUTING, 2012, 8 (01) : 2 - 21
  • [7] De Luca A., 2012, P CHI, P987, DOI [10.1145/2207676.2208544, DOI 10.1145/2207676.2208544]
  • [8] Dediou H., 2012, WHEN WILL TABLETS OU
  • [9] Dediu H., SYSTEMTAP
  • [10] Dini Gianluca, 2012, LNCS, P240, DOI DOI 10.1007/978-3-642-33704-8_21