Skip to main navigation Skip to search Skip to main content

Trimming Approach of Robust Clustering for Smartphone Behavioral Analysis

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Nowadays, smart phones get increasingly popular which also attracted hackers. With the increasing capabilities of such phones, more and more malicious softwares targeting these devices have been developed. Malwares can seriously damage an infected device within seconds. In this paper, we propose to use the trimming approaches for automatic clustering (trimmed k-means, Tclust) of smartphone's applications. They aim to identify homogenous groups of applications exhibiting similar behavior and allow to handle a proportion of contaminating data to guarantee the robustness of clustering. Then, a clustering-based detection technique is applied to compute an anomaly score for each application, leading to discover the most dangerous among them. Initial experiments results prove the efficiency and the accuracy of the used clustering methods in detecting abnormal smartphone's applications and that with a low false alerts rate.

Original languageEnglish
Title of host publicationProceedings - 2014 International Conference on Embedded and Ubiquitous Computing, EUC 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages315-320
Number of pages6
ISBN (Electronic)9780769552491
DOIs
Publication statusPublished - 18 Nov 2014
Event12th IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2014 - Milano, Italy
Duration: 26 Aug 201428 Aug 2014

Publication series

NameProceedings - 2014 International Conference on Embedded and Ubiquitous Computing, EUC 2014

Conference

Conference12th IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2014
Country/TerritoryItaly
CityMilano
Period26/08/1428/08/14

Fingerprint

Dive into the research topics of 'Trimming Approach of Robust Clustering for Smartphone Behavioral Analysis'. Together they form a unique fingerprint.

Cite this