Mobile Apps identification based on network flows

被引:14
作者
Ajaeiya, Georgi [1 ]
Elhajj, Imad H. [1 ]
Chehab, Ali [1 ]
Kayssi, Ayman [1 ]
Kneppers, Marc [2 ]
机构
[1] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut 11072020, Lebanon
[2] TELUS Corp, Vancouver, BC, Canada
关键词
Android security; Traffic analysis; App profiling; Flow-based classification; MALWARE DETECTION;
D O I
10.1007/s10115-017-1111-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Network operators and mobile carriers are facing serious security challenges caused by an increasing number of services provided by smartphone Apps. For example, Android OS has more than 1 million Apps in stores. Hence, network administrators tend to adopt strict policies to secure their infrastructure. The aim of this study is to propose an efficient framework that has a classification component based on traffic analysis of Android Apps. The framework differs from other proposed studies by focusing on identifying Apps traffic from a network perspective without introducing any overhead on subscribers smartphones. Additionally, it involves a technique for pre-processing network flows generated by Apps to acquire a set of features that are used to build an identification model using machine learning algorithms. The classification model is built using classification ensembles. A group of chosen users contribute in training the classification model, which learns the normal behavior of selected Apps. Eventually, the model should be able to detect abnormal behavior of similar Apps across the network. A 93.78% classification accuracy is achieved with a low false positive rate under 0.5%. In addition, the framework is able to detect abnormal flows of unknown classes by implementing an outlier detection mechanism and reported a 94% accuracy.
引用
收藏
页码:771 / 796
页数:26
相关论文
共 38 条
[1]  
[Anonymous], 1994, USING DYNAMIC TIME W
[2]  
[Anonymous], IJCAI 2001 WORKSHOP
[3]  
[Anonymous], P 31 ANN ACM S APPL
[4]  
[Anonymous], 1993, INTRO BOOTSTRAP
[5]  
[Anonymous], 2011, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
[6]  
[Anonymous], 2012, IT PROF
[7]  
Bagheri SC., 2012, Current Therapy in Oral and Maxillofacial Surgery, V1st, P1
[8]   An empirical comparison of voting classification algorithms: Bagging, boosting, and variants [J].
Bauer, E ;
Kohavi, R .
MACHINE LEARNING, 1999, 36 (1-2) :105-139
[9]  
Breiman L., 2001, Machine Learning, V45, P5
[10]  
Chen C., 2004, USING RANDOM FOREST, P1