A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Nowadays smartphones get increasingly popular which also attracted hackers. With the increasing capabilities of such phones, more and more malicious softwares targeting these devices have been developed. Malwares can seriously damage an infected device within seconds. This paper focus on the aggregation of a popular probabilistic model: the Gaussian mixture model, for a dynamic detection of the abnormal behavior in smartphone applications. More precisely, we propose to apply a mixture model estimation technique on the behavior of applications, for density modeling and data clustering. The mixture models of the different smartphones are then aggregated to estimate the global model that reflecting the probability density of the global data set. Furthermore, we carry out a model-based clustering outlier detection to compute an anomaly score for each application, leading to identify the malware applications. Initial experiments results prove the efficiency and the accuracy of the model-based clustering in detecting abnormal applications with a low false alerts rate.

Original languageEnglish
Title of host publication2014 Global Information Infrastructure and Networking Symposium, GIIS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479954902
DOIs
Publication statusPublished - 22 Oct 2014
Event2014 Global Information Infrastructure and Networking Symposium, GIIS 2014 - Montreal, Canada
Duration: 15 Sept 201419 Sept 2014

Publication series

Name2014 Global Information Infrastructure and Networking Symposium, GIIS 2014

Conference

Conference2014 Global Information Infrastructure and Networking Symposium, GIIS 2014
Country/TerritoryCanada
CityMontreal
Period15/09/1419/09/14

Fingerprint

Dive into the research topics of 'A Gaussian mixture model for dynamic detection of abnormal behavior in smartphone applications'. Together they form a unique fingerprint.

Cite this