Passer à la navigation principale Passer à la recherche Passer au contenu principal

Trimming Approach of Robust Clustering for Smartphone Behavioral Analysis

Résultats de recherche: Le chapitre dans un livre, un rapport, une anthologie ou une collectionContribution à une conférenceRevue par des pairs

Résumé

Nowadays, smart phones get increasingly popular which also attracted hackers. With the increasing capabilities of such phones, more and more malicious softwares targeting these devices have been developed. Malwares can seriously damage an infected device within seconds. In this paper, we propose to use the trimming approaches for automatic clustering (trimmed k-means, Tclust) of smartphone's applications. They aim to identify homogenous groups of applications exhibiting similar behavior and allow to handle a proportion of contaminating data to guarantee the robustness of clustering. Then, a clustering-based detection technique is applied to compute an anomaly score for each application, leading to discover the most dangerous among them. Initial experiments results prove the efficiency and the accuracy of the used clustering methods in detecting abnormal smartphone's applications and that with a low false alerts rate.

langue originaleAnglais
titreProceedings - 2014 International Conference on Embedded and Ubiquitous Computing, EUC 2014
EditeurInstitute of Electrical and Electronics Engineers Inc.
Pages315-320
Nombre de pages6
ISBN (Electronique)9780769552491
Les DOIs
étatPublié - 18 nov. 2014
Evénement12th IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2014 - Milano, Italie
Durée: 26 août 201428 août 2014

Série de publications

NomProceedings - 2014 International Conference on Embedded and Ubiquitous Computing, EUC 2014

Une conférence

Une conférence12th IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2014
Pays/TerritoireItalie
La villeMilano
période26/08/1428/08/14

Empreinte digitale

Examiner les sujets de recherche de « Trimming Approach of Robust Clustering for Smartphone Behavioral Analysis ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation