TY - GEN
T1 - Robust clustering methods for detecting smartphone's abnormal behavior
AU - El Attar, Ali
AU - Khatoun, Rida
AU - Birregah, Babiga
AU - Lemercier, Marc
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2016/4/3
Y1 - 2016/4/3
N2 - Smartphones have become increasingly popular, and, nowadays, thanks to the use of 3G networks, the need for connectivity in a business environment is significant. Smartphones provide access to a tremendous amount of sensitive information related to business, such as customer contacts, financial data and Intranet networks. If any of this information were to fall into the hands of hackers, it would be devastating for the company. In this paper, we propose a cluster-based approach to detecting abnormal behaviour in smartphone applications. First we carry out various robust clustering techniques that help to identify and regroup applications that exhibit similar behaviour. The clustering results are then used to define a cluster-based outlier factor for each application, which in turn identifies the top n malware applications. Initial results of the experiments prove the efficiency and accuracy of cluster-based approaches in detecting abnormal smartphone applications and those with a low false-alert rate.
AB - Smartphones have become increasingly popular, and, nowadays, thanks to the use of 3G networks, the need for connectivity in a business environment is significant. Smartphones provide access to a tremendous amount of sensitive information related to business, such as customer contacts, financial data and Intranet networks. If any of this information were to fall into the hands of hackers, it would be devastating for the company. In this paper, we propose a cluster-based approach to detecting abnormal behaviour in smartphone applications. First we carry out various robust clustering techniques that help to identify and regroup applications that exhibit similar behaviour. The clustering results are then used to define a cluster-based outlier factor for each application, which in turn identifies the top n malware applications. Initial results of the experiments prove the efficiency and accuracy of cluster-based approaches in detecting abnormal smartphone applications and those with a low false-alert rate.
U2 - 10.1109/WCNC.2014.6952790
DO - 10.1109/WCNC.2014.6952790
M3 - Conference contribution
AN - SCOPUS:84912119351
T3 - IEEE Wireless Communications and Networking Conference, WCNC
SP - 2552
EP - 2557
BT - IEEE Wireless Communications and Networking Conference, WCNC
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2014 IEEE Wireless Communications and Networking Conference, WCNC 2014
Y2 - 6 April 2014 through 9 April 2014
ER -