TY - GEN
T1 - Trimming Approach of Robust Clustering for Smartphone Behavioral Analysis
AU - El Attar, Ali
AU - Khatoun, Rida
AU - Lemercier, Marc
N1 - Publisher Copyright:
© 2014 IEEE.
PY - 2014/11/18
Y1 - 2014/11/18
N2 - Nowadays, smart phones get increasingly popular which also attracted hackers. With the increasing capabilities of such phones, more and more malicious softwares targeting these devices have been developed. Malwares can seriously damage an infected device within seconds. In this paper, we propose to use the trimming approaches for automatic clustering (trimmed k-means, Tclust) of smartphone's applications. They aim to identify homogenous groups of applications exhibiting similar behavior and allow to handle a proportion of contaminating data to guarantee the robustness of clustering. Then, a clustering-based detection technique is applied to compute an anomaly score for each application, leading to discover the most dangerous among them. Initial experiments results prove the efficiency and the accuracy of the used clustering methods in detecting abnormal smartphone's applications and that with a low false alerts rate.
AB - Nowadays, smart phones get increasingly popular which also attracted hackers. With the increasing capabilities of such phones, more and more malicious softwares targeting these devices have been developed. Malwares can seriously damage an infected device within seconds. In this paper, we propose to use the trimming approaches for automatic clustering (trimmed k-means, Tclust) of smartphone's applications. They aim to identify homogenous groups of applications exhibiting similar behavior and allow to handle a proportion of contaminating data to guarantee the robustness of clustering. Then, a clustering-based detection technique is applied to compute an anomaly score for each application, leading to discover the most dangerous among them. Initial experiments results prove the efficiency and the accuracy of the used clustering methods in detecting abnormal smartphone's applications and that with a low false alerts rate.
UR - https://www.scopus.com/pages/publications/84917678144
U2 - 10.1109/EUC.2014.54
DO - 10.1109/EUC.2014.54
M3 - Conference contribution
AN - SCOPUS:84917678144
T3 - Proceedings - 2014 International Conference on Embedded and Ubiquitous Computing, EUC 2014
SP - 315
EP - 320
BT - Proceedings - 2014 International Conference on Embedded and Ubiquitous Computing, EUC 2014
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 12th IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2014
Y2 - 26 August 2014 through 28 August 2014
ER -