Robust clustering methods for detecting smartphone's abnormal behavior

Ali El Attar, Rida Khatoun, Babiga Birregah, Marc Lemercier

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Smartphones have become increasingly popular, and, nowadays, thanks to the use of 3G networks, the need for connectivity in a business environment is significant. Smartphones provide access to a tremendous amount of sensitive information related to business, such as customer contacts, financial data and Intranet networks. If any of this information were to fall into the hands of hackers, it would be devastating for the company. In this paper, we propose a cluster-based approach to detecting abnormal behaviour in smartphone applications. First we carry out various robust clustering techniques that help to identify and regroup applications that exhibit similar behaviour. The clustering results are then used to define a cluster-based outlier factor for each application, which in turn identifies the top n malware applications. Initial results of the experiments prove the efficiency and accuracy of cluster-based approaches in detecting abnormal smartphone applications and those with a low false-alert rate.

Original languageEnglish
Title of host publicationIEEE Wireless Communications and Networking Conference, WCNC
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2552-2557
Number of pages6
ISBN (Electronic)9781479930838
DOIs
Publication statusPublished - 3 Apr 2016
Externally publishedYes
Event2014 IEEE Wireless Communications and Networking Conference, WCNC 2014 - Istanbul, Turkey
Duration: 6 Apr 20149 Apr 2014

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Conference

Conference2014 IEEE Wireless Communications and Networking Conference, WCNC 2014
Country/TerritoryTurkey
CityIstanbul
Period6/04/149/04/14

Fingerprint

Dive into the research topics of 'Robust clustering methods for detecting smartphone's abnormal behavior'. Together they form a unique fingerprint.

Cite this