SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018
DOI : 10.5121/ijaia.2018.9401 1
BEHAVIOR-BASED SECURITY FOR MOBILE
DEVICES USING MACHINE LEARNING
TECHNIQUES
Sherif Rashad1
and Jonathan Byrd2,3
1
University of Southern Indiana
Evansville, IN, USA
2
Colorado State University
Fort Collins, CO, USA
3
Morehead State University
Morehead, KY, USA
ABSTRACT
The goal of this research project is to design and implement a mobile application and machine learning
techniques to solve problems related to the security of mobile devices. We introduce in this paper a
behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of
mobile users. The proposed system was tested using Android OS and the initial experimental results show
that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly
detection in mobile devices.
KEYWORDS
Behavior-based Security, Anomaly Detection, Mobile Profiles, Mobile Computing.
1. INTRODUCTION AND RELATED WORK
In this research project we explore the rapidly evolving capabilities of modern smartphones with
a goal to design an innovative approach to improve the security of smartphones and better
understand the dynamic behavior of mobile users. With an increasing number of smartphone
users, it becomes highly important to improve the efficiency and security of these smart phones.
Individual computer users interact with machine interfaces in different ways, which includes
analyzing keystroke patterns, CLI commands, or navigation pathways through GUIs. We can
often differentiate between individual users based on these interactions.
In this project, we explore the problem of distinguishing Android phone users based on their
behavior using machine learning techniques. We have developed an Android application that
collects different features that represent user behavior information such as battery life, number of
applications running, tilt of the device, location, etc, and use this data to learn the behavior of
mobile users. This approach has a potential application in many areas including security.
Anomaly detection techniques based on user behavior model could be used to detect malicious
users who have gained access to a device. Additionally, it could be used to detect unusual low-
level commands run by malware. In addition to providing interesting information, such as which
features are most salient, classifying unique users has potential real-world applications such as:
International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018
2
• Distinguishing between users on multi-user systems. If a single device is shared by
multiple users, an application could prevent access of information from the incorrect user,
or automatically log into accounts based on the user behavior.
• Service/product recommendations
• Building offline behavior models to find correlations between demographics (age,
gender, location, etc.) and user behaviour
The problem of security of mobile devices is one of the most challenging problems because of the
dynamic nature of the mobile computing environment and the rapid deployment of mobile
devices. Machine learning can be used effectively to solve different types of security problems in
mobile devices [1], [2], [3], [4], [5], [6]. These problems include malware and anomaly detection.
Researchers have used several signature-based, behavior-based, and heuristic methods to solve
the problem of malware detection for computer and network systems in general [7], [8]. The
authors in [2] introduced an approach closes to the proposed approach with extracted features
from smartphones and used observation time slices. They focused on using only the K-means
clustering algorithm to build the user profiles. It will be helpful to consider the ranking of the
extracted features and select a smaller set of features. The authors in [1] introduced Qualcomm’s
Snapdragon Smart Protect for malware protection for mobile devices. The proposed approach in
[1] focused on analyzing the apps statically and analyzing their behavior at runtime with
monitoring the way devices associated with Wi-Fi access points [1].
We focus on this paper on the security issues related to the problem of anomaly detection for
mobile devices. The goal is to develop a smart approach that utilizes the data collected from
different applications, computing resources, and sensors used by the mobile users to learn the
dynamic behavior of these mobile users. Machine learning will play a crucial rule in learning the
behavior patterns and identifying the anomaly behavior. We tried to collect different types of
features and we used feature ranking techniques to select the minimum number of features that
can be used to solve this problem. We focused also on applying different types of classification
algorithms to predict the corresponding user.
The next section discusses the architecture of the proposed technique. The data collection and the
feature selection process and its importance for this type of application are discussed in that
section. Section three discusses the experimental results with a comparison between the results
from three different classification algorithms using different features. Section four gives a
conclusion and discusses directions for future research work related to this area.
2. PROPOSED TECHNIQUE
2.1. Proposed Architecture
An overview of the architecture of the proposed approach is shown in Figure 1. The basic
components of this architecture include the data collection app, the feature selection algorithms,
and the machine learning algorithms. Once the data has been collected using different features we
start to analyze the collected data to reduce the number of used feature and select only the most
effective features. This can be accomplished by applying weight-based feature ranking algorithms
and select the features with high ranks. This process of feature selections will reduce the
dimensionality of the problem and the overall computational complexity. Machine learning
algorithms will use the selected features to learn the behavior models and classify the users based
on the learned behavior with a goal to detect any anomaly behavior.
International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018
3
Figure. 1 Basic Architecture of the Proposed Approach
2.2. Data Collection
As shown in this Figure 1, there are different types of data that are collected from the
smartphones:
• Spatial Data: this indicates data related to the location of the mobile user.
• Temporal Data: this indicates the time and the day information collected during the
navigation of mobile users.
• Apps Usage Data: this includes data related to the foreground app and the running Apps.
• Phone Usage Data: this includes data related to using the phone such as the average SMS
received/sent length.
• System Data: this includes data related to the system such available memory and battery
life.
The data will be collected at regular time intervals when the device is powered on. Data includes
different types of features as shown in Figure 1. A summary of the data features that are collated
is shown in Table 1. The table shows a list of different features with their basic description.
Behavior Models
Feature Selection
and Machine
Learning
Smartphone Data
Apps Usage Data
Temporal Data
Spatial Data
Phone Usage Data
System Data
International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018
4
Table 1. A list of Different Data Features for Smartphones
2.3. Feature Selection and Machine Learning
Feature reduction will play an important role in this problem to reduce the overall complexity in
the mobile computing environment. Feature selection will help reduce the features by selecting
the most relevant features and remove redundant and irrelevant features from the data [9].
One of the feature selection algorithms that can be used in this problem is the well-known Relieff
algorithm [10], [11]. The Relieff algorithm is an extension of the well-known Relief algorithm
that was introduced by Kira and Rendell [12], [13]. The Relieff algorithm can work with
problems of multiple classes. The basic Relief algorithm is shown in Figure 2.
The Relief algorithm evaluates the different features based on the provided training data sets with
the corresponding class labels and compute a ranking score based on ability of the feature to
distinguish between the different classes in the training dataset [4]. This will be an essential
process in the proposed approach to reduce the overall complexity related to process of the
learning the behavior models from the collected data. This will also help to collect only the
relevant data in the next phase of process.
Feature No. Feature Description
1 Date/Time
2 Forground App
3 Number of running Apps
4 List of Apps
5 Latitude
6 Longitude
7 Address
8 Tilt (x,y,z)
9 Available Memory
10 Battery Life
11 List of Available Networks
12 Bytes Received since Boot
13 Bytes Transmitted since Boot
14 Average SMS Received Length
15 Average SMS sent Length
16 Average Outgoing Call Length
17 Brightness
18 Charger Type
19 Orientation
20 Proximity
International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018
5
Figure 2. Basic Relief Algorithm [12], [13]
We effectively applied different machine learning algorithms on the selected features. These
algorithms include decision trees classifier, Naïve Bayes classifier, K-Nearest Neighbor (KNN)
classifier. The decision trees and the Naïve Bayes classifiers will be more practical in the mobile
computing environment. The KNN classifier is included for the comparison purposes.
3. EXPERIMENTAL RESULTS
3.1. Data Collection
We built an Android application to collect the data. The application collects the data at regular
time intervals of approximately 5 minutes when the device is powered on. We ran our initial
experiments and collected nearly 12,000 samples of different features from 4 classes (users: U1,
U2, U3, and U4). This data was collected over a time frame of approximately two weeks. The
interface of the Android Collector App is shown in Figure 3. We used Weka machine learning
and data mining software [14] for implementations of feature selection and classification
algorithms that can be used to predict the four classes simultaneously.
Figure 3. The Interface of the Developed Android Collector App
3.2. Feature Selection Results
We started by considering basic 13 features that are currently in a meaningful form. These
Input: Training Dataset S with size n samples and m
features
Initialize all weights for features to zero: W[A]=0
for i = 1 to n
randomly select an instance X from the training
dataset
find nearest hit H and nearest miss M samples
for A = 1 to m
International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018
6
features are shown in Table 2. We applied the Relieff algorithm and the generated scores were
used to the rank features. The corresponding ranks for the13 features are shown in Table 2. The
results show that features related to address and foreground app are the most two important
features. Also, the number of running apps and the available memory will play a major rule in the
classification process. The results clearly show that we can effectively reduce the size of the
collected data by removing many of the features with the low ranks at the end of the list. We still
need to conduct additional experiments to determine the number of features that can be removed
without affecting the process of learning the behavior of mobile users and use it effectively for
the problem of anomaly detection. We conducted additional experiments with different number of
features and compared between the results.
Table 2. Feature Ranking Results of the First Thirteen Features
Feature Description Weight Rank
Address 0.77866 1
Foreground App 0.76037 2
Number of running Apps 0.2932 3
Available Memory 0.19675 4
Bytes Transmitted since Boot 0.07945 5
Battery Life 0.06715 6
Latitude 0.05704 7
Bytes Received since Boot 0.05583 8
Proximity 0.02751 9
Longitude 0.02581 10
Charger Type 0.00584 11
Brightness 0.00128 12
Orientation 0.00124 13
3.3. Classification Results
Several experiments were conducted to study the performance of the proposed approach using
different classifiers and different sets of features. We started by considering all the 13 features
shown in Table 2 and we used with 10-fold cross-validation in our experiments because of the
current data size. The well-known J48 decision tree algorithm was used, and we compared its
results with the Naïve Bayes classifier and the KNN classifier. The accuracy and the confusion
matrix results are shown in Figures 4 and 5 respectively for the three algorithms. The results
show that the proposed technique can effectively distinguish between all users with high accuracy
for all algorithms. This is a crucial for the process of anomaly detection. The decision tree
classifier gives the highest accuracy (99.97%).
International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018
7
Figure 4. Accuracy results using 13 features & 10-fold cross-validation
Figure 5. Confusion Matrix results using 13 features & 10-fold cross-validation
Predicted
U1 U2 U3 U4
1912 5 3 0
U1
Actual
4 3031 7 3
U2
0 2 3441 0
U3
1 3 12 3431
U4
(a) KNN Classifier
Predicted
U1 U2 U3 U4
1919 0 0 1
U1
Actual
0 3044 0 1
U2
1 0 3442 0
U3
22 0 0 3425
U4
(b) Naïve Bayes Classifier
Predicted
U1 U2 U3 U4
1919 0 0 1
U1
Actual
0 3044 0 1
U2
1 0 3442 0
U3
22 0 0 3425
U4
International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018
8
However, by using the Relieff algorithm for feature selection, we reduced the feature space to the
first six features and then to the first four features and compared between the results for different
algorithms. The accuracy and the confusion matrix results using only the first four features are
shown in Figures 6 and 7 respectively for the three algorithms. The results show that there is a
reduction in the accuracy of prediction for the J48 algorithm compared to the other algorithms,
but it is still a high rang of accuracy. This result show that we can still classify the users with high
accuracy with reducing the collected and processed dataset. This will be important for real-time
process to speed up the process of learning and classification.
Figure 6. Classification accuracy results using the first four features & 10-fold cross-validation
Predicted
U1 U2 U3 U4
1905 14 0 1
U1
Actual
24 3007 5 9
U2
2 2 3437 2
U3
0 2 8 3437
U4
(a) KNN Classifier
Predicted
U1 U2 U3 U4
1910 7 0 3
U1
Actual
65 2980 0 0
U2
0 0 3443 0
U3
6 25 5 3411
U4
(b) Naïve Bayes Classifier
International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018
9
Figure 7. Confusion Matrix results using the first four features & 10-fold cross-validation
4. CONCLUSION AND FUTURE WORK
The goal of this research project is to propose a smart approach for the problem of behavior-based
security of mobile devices using machine learning techniques. We focused on the problem of
anomaly detection, but the proposed approach has possible applications in many other areas to
identify the mobile users by learning the behavior of using the mobile devices.
An Android application was used to collect location and behavior data of mobile users to build a
behavior-based security system. The Relieff feature ranking algorithm was used effectively to
reduce the dimension and the volume of the collected data. Different algorithms were used to
analyze the behavior data of mobile users. Our initial experimental results show that the proposed
techniques can be used to model the behavior of mobile users and identify the mobile users based
on behavior data with a high accuracy and a reduced set of collected data.
Future work includes improving the overall performance and considering the most relevant
features based on the mobile user. We need to test multiple users on the same device and we
expect that would provide useful data. We also need to consider more users and other possible
applications of the proposed techniques to provide new identity-based applications and services.
REFERENCES
[1] Nayeem Islam, Saumitra Das, and Yin Chen, “On-Device Mobile Phone Security Exploits Machine
Learning”, IEEE Pervasive Computing, vol. 16, Issue 2, pp. 92-96, April-June 2017.
[2] Khurram Majeed, Yanguo Jing, Dusica Novakovic, and Karim Ouazzane, "Behaviour Based
Anomaly Detection for Smartphones Using Machine Learning Algorithm", Proceedings of the
International conference on Computer Science and Information Systems (ICSIS’2014), pp. 67-73,
2014.
[3] Ashkan Shamili, Christian Bauckhage, and Tansu Alpcan, “Malware Detection on Mobile Devices
Using Distributed Machine Learning”, Proceedings of the 20th International Conference on Pattern
Recognition, pp. 4348 – 4351, 2010.
[4] M. Waqar Afridi, Toqeer Ali, Turki Alghamdi, Tamleek Ali, and Muhammad Yasar, “Android
Application Behavioral Analysis Through Intent Monitoring”, Proceedings of the 6th International
Symposium on Digital Forensic and Security (ISDFS), pp. 1-8, 2018.
Predicted
U1 U2 U3 U4
1872 39 1 8
U1
Actual
26 2969 38 12
U2
7 7 3418 11
U3
5 46 2 3394
U4
(c) J48 Decision Tree Classifier
International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018
10
[5] Saba Arshad, Munam Shah, Abdul Wahid, Amjad Mehmood, Houbing Song, and Hongnian Yu,
“SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System”,
IEEE Access, vol. 6, pp. 4321-4339, January 2018.
[6] A. Saracino, D. Sgandurra, G. Dini, and F. Martinelli, ‘‘MADAM: Effective and efficient behavior-
based android malware detection and prevention,’’ IEEE Transactions on Dependable and Secure
Computing., vol. 15, no. 1, pp. 83-97, Jan-Feb. 2018.
[7] Huaqing Lin, Zheng Yan, Yu Chen, and Lifang Zhang, “A Survey on Network Security-Related
Data Collection Technologies”, Huaqing Lin, Zheng Yan, Yu Chen, and Lifang Zhang, IEEE
Access, vol. 6, pp. 18345-18365, January 2018.
[8] Zahra Bazrafshan, Hashem Hashemi, Seyed Mehdi Hazrati Fard, and Ali Hamzeh, “A survey on
heuristic malware detection techniques”, Proceedings of the 5th Conference on Information and
Knowledge Technology (IKT), pp.113-120, 2013.
[9] Kantardzic, M. “Data-Mining Concepts, in Data Mining: Concepts, Models, Methods, and
Algorithms”, Second Edition, John Wiley & Sons, Inc., 2011.
[10] Kononenko, I., E. Simec, and M. Robnik- Sikonja, “Overcoming the Myopia of Inductive Learning
Algorithms with RELIEFF”, Applied Intelligence, vol 7, pp. 39–55, 1997.
[11] M. Robnik-Sikonja, and I. Kononenko, “Theoretical and empirical analysis of ReliefF and RReliefF.
Machine Learning”, vol. 53, pp. 23-69, 2003.
[12] K. Kira and L. Rendell, “A practical approach to feature selection”, Proceedings of the 9th
International Conference on Machine Learning, Morgan Kaufmann, pp.249-256, 1992.
[13] K. Kira and L. Rendell, “The feature selection problem: traditional methods and new algorithm”,
Proceedings of the 10th National Conference on Artificial Intelligence (AAAI 92), pp. 129-134,
1992.
[14] Weka 3 - Data Mining with Open Source Machine Learning Software in Java. [Online]. Available:
http://www.cs.waikato.ac.nz/ml/weka/

Más contenido relacionado

La actualidad más candente

Comparative Analysis: Effective Information Retrieval Using Different Learnin...
Comparative Analysis: Effective Information Retrieval Using Different Learnin...Comparative Analysis: Effective Information Retrieval Using Different Learnin...
Comparative Analysis: Effective Information Retrieval Using Different Learnin...RSIS International
 
A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems IJECEIAES
 
IRJET- An Android based Image Processing Application to Detect Plant Disease
IRJET-  	  An Android based Image Processing Application to Detect Plant DiseaseIRJET-  	  An Android based Image Processing Application to Detect Plant Disease
IRJET- An Android based Image Processing Application to Detect Plant DiseaseIRJET Journal
 
7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...INFOGAIN PUBLICATION
 
Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...IJECEIAES
 
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATIONEDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATIONIJEEE
 
Smart Fruit Classification using Neural Networks
Smart Fruit Classification using Neural NetworksSmart Fruit Classification using Neural Networks
Smart Fruit Classification using Neural Networksijtsrd
 
Detection of plant diseases
Detection of plant diseasesDetection of plant diseases
Detection of plant diseasesMuneesh Wari
 
IRJET - Disease Detection in Plant using Machine Learning
IRJET -  	  Disease Detection in Plant using Machine LearningIRJET -  	  Disease Detection in Plant using Machine Learning
IRJET - Disease Detection in Plant using Machine LearningIRJET Journal
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationseSAT Journals
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsVijay Karan
 
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET Journal
 

La actualidad más candente (20)

COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...
COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...
COMPARATIVE ANALYSIS OF DIFFERENT MACHINE LEARNING ALGORITHMS FOR PLANT DISEA...
 
Comparative Analysis: Effective Information Retrieval Using Different Learnin...
Comparative Analysis: Effective Information Retrieval Using Different Learnin...Comparative Analysis: Effective Information Retrieval Using Different Learnin...
Comparative Analysis: Effective Information Retrieval Using Different Learnin...
 
A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems
 
H1803044651
H1803044651H1803044651
H1803044651
 
IRJET- An Android based Image Processing Application to Detect Plant Disease
IRJET-  	  An Android based Image Processing Application to Detect Plant DiseaseIRJET-  	  An Android based Image Processing Application to Detect Plant Disease
IRJET- An Android based Image Processing Application to Detect Plant Disease
 
7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...7 multi biometric fake detection system using image quality based liveness de...
7 multi biometric fake detection system using image quality based liveness de...
 
J1803045759
J1803045759J1803045759
J1803045759
 
G1803044045
G1803044045G1803044045
G1803044045
 
Kapil dikshit ppt
Kapil dikshit pptKapil dikshit ppt
Kapil dikshit ppt
 
Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...
 
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATIONEDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
EDGE DETECTION IN DIGITAL IMAGE USING MORPHOLOGY OPERATION
 
Smart Fruit Classification using Neural Networks
Smart Fruit Classification using Neural NetworksSmart Fruit Classification using Neural Networks
Smart Fruit Classification using Neural Networks
 
Ijmet 10 01_095
Ijmet 10 01_095Ijmet 10 01_095
Ijmet 10 01_095
 
F1803042939
F1803042939F1803042939
F1803042939
 
IJET-V3I1P25
IJET-V3I1P25IJET-V3I1P25
IJET-V3I1P25
 
Detection of plant diseases
Detection of plant diseasesDetection of plant diseases
Detection of plant diseases
 
IRJET - Disease Detection in Plant using Machine Learning
IRJET -  	  Disease Detection in Plant using Machine LearningIRJET -  	  Disease Detection in Plant using Machine Learning
IRJET - Disease Detection in Plant using Machine Learning
 
A review on fake biometric detection system for various applications
A review on fake biometric detection system for various applicationsA review on fake biometric detection system for various applications
A review on fake biometric detection system for various applications
 
M phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projectsM phil-computer-science-biometric-system-projects
M phil-computer-science-biometric-system-projects
 
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge EngineeringIRJET- Logistics Network Superintendence Based on Knowledge Engineering
IRJET- Logistics Network Superintendence Based on Knowledge Engineering
 

Similar a BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES

Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniquesgerogepatton
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSIJNSA Journal
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSIJNSA Journal
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTIRJET Journal
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’seSAT Journals
 
Security and Privacy Enhancement Framework for Mobile Devices using Active Au...
Security and Privacy Enhancement Framework for Mobile Devices using Active Au...Security and Privacy Enhancement Framework for Mobile Devices using Active Au...
Security and Privacy Enhancement Framework for Mobile Devices using Active Au...ijtsrd
 
An Android Based Intelligent Anti-theft and Tracking System for Automobiles
An Android Based Intelligent Anti-theft and Tracking System for AutomobilesAn Android Based Intelligent Anti-theft and Tracking System for Automobiles
An Android Based Intelligent Anti-theft and Tracking System for AutomobilesBRNSSPublicationHubI
 
Management of time uncertainty in agile
Management of time uncertainty in agileManagement of time uncertainty in agile
Management of time uncertainty in agileijseajournal
 
Meffortmob a effort size measurement
Meffortmob a effort size measurementMeffortmob a effort size measurement
Meffortmob a effort size measurementijseajournal
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperMichael Murphy
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection SystemIRJET Journal
 
Empowering anomaly detection algorithm: a review
Empowering anomaly detection algorithm: a reviewEmpowering anomaly detection algorithm: a review
Empowering anomaly detection algorithm: a reviewIAESIJAI
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEijesajournal
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEijesajournal
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEijesajournal
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET Journal
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine LearningIRJET Journal
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET Journal
 
Software Bug Detection Algorithm using Data mining Techniques
Software Bug Detection Algorithm using Data mining TechniquesSoftware Bug Detection Algorithm using Data mining Techniques
Software Bug Detection Algorithm using Data mining TechniquesAM Publications
 

Similar a BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES (20)

Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning TechniquesBehavior-Based Security for Mobile Devices Using Machine Learning Techniques
Behavior-Based Security for Mobile Devices Using Machine Learning Techniques
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
 
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMSA MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
A MACHINE LEARNING APPROACH TO ANOMALY-BASED DETECTION ON ANDROID PLATFORMS
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
IJET-V3I2P15
IJET-V3I2P15IJET-V3I2P15
IJET-V3I2P15
 
Provide security about risk score in mobile application’s
Provide security about risk score in mobile application’sProvide security about risk score in mobile application’s
Provide security about risk score in mobile application’s
 
Security and Privacy Enhancement Framework for Mobile Devices using Active Au...
Security and Privacy Enhancement Framework for Mobile Devices using Active Au...Security and Privacy Enhancement Framework for Mobile Devices using Active Au...
Security and Privacy Enhancement Framework for Mobile Devices using Active Au...
 
An Android Based Intelligent Anti-theft and Tracking System for Automobiles
An Android Based Intelligent Anti-theft and Tracking System for AutomobilesAn Android Based Intelligent Anti-theft and Tracking System for Automobiles
An Android Based Intelligent Anti-theft and Tracking System for Automobiles
 
Management of time uncertainty in agile
Management of time uncertainty in agileManagement of time uncertainty in agile
Management of time uncertainty in agile
 
Meffortmob a effort size measurement
Meffortmob a effort size measurementMeffortmob a effort size measurement
Meffortmob a effort size measurement
 
DasGreenPerezMurphy_Paper
DasGreenPerezMurphy_PaperDasGreenPerezMurphy_Paper
DasGreenPerezMurphy_Paper
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
Empowering anomaly detection algorithm: a review
Empowering anomaly detection algorithm: a reviewEmpowering anomaly detection algorithm: a review
Empowering anomaly detection algorithm: a review
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android DevicesIRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
IRJET - Research on Data Mining of Permission-Induced Risk for Android Devices
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
 
IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
Software Bug Detection Algorithm using Data mining Techniques
Software Bug Detection Algorithm using Data mining TechniquesSoftware Bug Detection Algorithm using Data mining Techniques
Software Bug Detection Algorithm using Data mining Techniques
 

Último

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 

Último (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 

BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES

  • 1. International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018 DOI : 10.5121/ijaia.2018.9401 1 BEHAVIOR-BASED SECURITY FOR MOBILE DEVICES USING MACHINE LEARNING TECHNIQUES Sherif Rashad1 and Jonathan Byrd2,3 1 University of Southern Indiana Evansville, IN, USA 2 Colorado State University Fort Collins, CO, USA 3 Morehead State University Morehead, KY, USA ABSTRACT The goal of this research project is to design and implement a mobile application and machine learning techniques to solve problems related to the security of mobile devices. We introduce in this paper a behavior-based approach that can be applied in a mobile environment to capture and learn the behavior of mobile users. The proposed system was tested using Android OS and the initial experimental results show that the proposed technique is promising, and it can be used effectively to solve the problem of anomaly detection in mobile devices. KEYWORDS Behavior-based Security, Anomaly Detection, Mobile Profiles, Mobile Computing. 1. INTRODUCTION AND RELATED WORK In this research project we explore the rapidly evolving capabilities of modern smartphones with a goal to design an innovative approach to improve the security of smartphones and better understand the dynamic behavior of mobile users. With an increasing number of smartphone users, it becomes highly important to improve the efficiency and security of these smart phones. Individual computer users interact with machine interfaces in different ways, which includes analyzing keystroke patterns, CLI commands, or navigation pathways through GUIs. We can often differentiate between individual users based on these interactions. In this project, we explore the problem of distinguishing Android phone users based on their behavior using machine learning techniques. We have developed an Android application that collects different features that represent user behavior information such as battery life, number of applications running, tilt of the device, location, etc, and use this data to learn the behavior of mobile users. This approach has a potential application in many areas including security. Anomaly detection techniques based on user behavior model could be used to detect malicious users who have gained access to a device. Additionally, it could be used to detect unusual low- level commands run by malware. In addition to providing interesting information, such as which features are most salient, classifying unique users has potential real-world applications such as:
  • 2. International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018 2 • Distinguishing between users on multi-user systems. If a single device is shared by multiple users, an application could prevent access of information from the incorrect user, or automatically log into accounts based on the user behavior. • Service/product recommendations • Building offline behavior models to find correlations between demographics (age, gender, location, etc.) and user behaviour The problem of security of mobile devices is one of the most challenging problems because of the dynamic nature of the mobile computing environment and the rapid deployment of mobile devices. Machine learning can be used effectively to solve different types of security problems in mobile devices [1], [2], [3], [4], [5], [6]. These problems include malware and anomaly detection. Researchers have used several signature-based, behavior-based, and heuristic methods to solve the problem of malware detection for computer and network systems in general [7], [8]. The authors in [2] introduced an approach closes to the proposed approach with extracted features from smartphones and used observation time slices. They focused on using only the K-means clustering algorithm to build the user profiles. It will be helpful to consider the ranking of the extracted features and select a smaller set of features. The authors in [1] introduced Qualcomm’s Snapdragon Smart Protect for malware protection for mobile devices. The proposed approach in [1] focused on analyzing the apps statically and analyzing their behavior at runtime with monitoring the way devices associated with Wi-Fi access points [1]. We focus on this paper on the security issues related to the problem of anomaly detection for mobile devices. The goal is to develop a smart approach that utilizes the data collected from different applications, computing resources, and sensors used by the mobile users to learn the dynamic behavior of these mobile users. Machine learning will play a crucial rule in learning the behavior patterns and identifying the anomaly behavior. We tried to collect different types of features and we used feature ranking techniques to select the minimum number of features that can be used to solve this problem. We focused also on applying different types of classification algorithms to predict the corresponding user. The next section discusses the architecture of the proposed technique. The data collection and the feature selection process and its importance for this type of application are discussed in that section. Section three discusses the experimental results with a comparison between the results from three different classification algorithms using different features. Section four gives a conclusion and discusses directions for future research work related to this area. 2. PROPOSED TECHNIQUE 2.1. Proposed Architecture An overview of the architecture of the proposed approach is shown in Figure 1. The basic components of this architecture include the data collection app, the feature selection algorithms, and the machine learning algorithms. Once the data has been collected using different features we start to analyze the collected data to reduce the number of used feature and select only the most effective features. This can be accomplished by applying weight-based feature ranking algorithms and select the features with high ranks. This process of feature selections will reduce the dimensionality of the problem and the overall computational complexity. Machine learning algorithms will use the selected features to learn the behavior models and classify the users based on the learned behavior with a goal to detect any anomaly behavior.
  • 3. International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018 3 Figure. 1 Basic Architecture of the Proposed Approach 2.2. Data Collection As shown in this Figure 1, there are different types of data that are collected from the smartphones: • Spatial Data: this indicates data related to the location of the mobile user. • Temporal Data: this indicates the time and the day information collected during the navigation of mobile users. • Apps Usage Data: this includes data related to the foreground app and the running Apps. • Phone Usage Data: this includes data related to using the phone such as the average SMS received/sent length. • System Data: this includes data related to the system such available memory and battery life. The data will be collected at regular time intervals when the device is powered on. Data includes different types of features as shown in Figure 1. A summary of the data features that are collated is shown in Table 1. The table shows a list of different features with their basic description. Behavior Models Feature Selection and Machine Learning Smartphone Data Apps Usage Data Temporal Data Spatial Data Phone Usage Data System Data
  • 4. International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018 4 Table 1. A list of Different Data Features for Smartphones 2.3. Feature Selection and Machine Learning Feature reduction will play an important role in this problem to reduce the overall complexity in the mobile computing environment. Feature selection will help reduce the features by selecting the most relevant features and remove redundant and irrelevant features from the data [9]. One of the feature selection algorithms that can be used in this problem is the well-known Relieff algorithm [10], [11]. The Relieff algorithm is an extension of the well-known Relief algorithm that was introduced by Kira and Rendell [12], [13]. The Relieff algorithm can work with problems of multiple classes. The basic Relief algorithm is shown in Figure 2. The Relief algorithm evaluates the different features based on the provided training data sets with the corresponding class labels and compute a ranking score based on ability of the feature to distinguish between the different classes in the training dataset [4]. This will be an essential process in the proposed approach to reduce the overall complexity related to process of the learning the behavior models from the collected data. This will also help to collect only the relevant data in the next phase of process. Feature No. Feature Description 1 Date/Time 2 Forground App 3 Number of running Apps 4 List of Apps 5 Latitude 6 Longitude 7 Address 8 Tilt (x,y,z) 9 Available Memory 10 Battery Life 11 List of Available Networks 12 Bytes Received since Boot 13 Bytes Transmitted since Boot 14 Average SMS Received Length 15 Average SMS sent Length 16 Average Outgoing Call Length 17 Brightness 18 Charger Type 19 Orientation 20 Proximity
  • 5. International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018 5 Figure 2. Basic Relief Algorithm [12], [13] We effectively applied different machine learning algorithms on the selected features. These algorithms include decision trees classifier, Naïve Bayes classifier, K-Nearest Neighbor (KNN) classifier. The decision trees and the Naïve Bayes classifiers will be more practical in the mobile computing environment. The KNN classifier is included for the comparison purposes. 3. EXPERIMENTAL RESULTS 3.1. Data Collection We built an Android application to collect the data. The application collects the data at regular time intervals of approximately 5 minutes when the device is powered on. We ran our initial experiments and collected nearly 12,000 samples of different features from 4 classes (users: U1, U2, U3, and U4). This data was collected over a time frame of approximately two weeks. The interface of the Android Collector App is shown in Figure 3. We used Weka machine learning and data mining software [14] for implementations of feature selection and classification algorithms that can be used to predict the four classes simultaneously. Figure 3. The Interface of the Developed Android Collector App 3.2. Feature Selection Results We started by considering basic 13 features that are currently in a meaningful form. These Input: Training Dataset S with size n samples and m features Initialize all weights for features to zero: W[A]=0 for i = 1 to n randomly select an instance X from the training dataset find nearest hit H and nearest miss M samples for A = 1 to m
  • 6. International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018 6 features are shown in Table 2. We applied the Relieff algorithm and the generated scores were used to the rank features. The corresponding ranks for the13 features are shown in Table 2. The results show that features related to address and foreground app are the most two important features. Also, the number of running apps and the available memory will play a major rule in the classification process. The results clearly show that we can effectively reduce the size of the collected data by removing many of the features with the low ranks at the end of the list. We still need to conduct additional experiments to determine the number of features that can be removed without affecting the process of learning the behavior of mobile users and use it effectively for the problem of anomaly detection. We conducted additional experiments with different number of features and compared between the results. Table 2. Feature Ranking Results of the First Thirteen Features Feature Description Weight Rank Address 0.77866 1 Foreground App 0.76037 2 Number of running Apps 0.2932 3 Available Memory 0.19675 4 Bytes Transmitted since Boot 0.07945 5 Battery Life 0.06715 6 Latitude 0.05704 7 Bytes Received since Boot 0.05583 8 Proximity 0.02751 9 Longitude 0.02581 10 Charger Type 0.00584 11 Brightness 0.00128 12 Orientation 0.00124 13 3.3. Classification Results Several experiments were conducted to study the performance of the proposed approach using different classifiers and different sets of features. We started by considering all the 13 features shown in Table 2 and we used with 10-fold cross-validation in our experiments because of the current data size. The well-known J48 decision tree algorithm was used, and we compared its results with the Naïve Bayes classifier and the KNN classifier. The accuracy and the confusion matrix results are shown in Figures 4 and 5 respectively for the three algorithms. The results show that the proposed technique can effectively distinguish between all users with high accuracy for all algorithms. This is a crucial for the process of anomaly detection. The decision tree classifier gives the highest accuracy (99.97%).
  • 7. International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018 7 Figure 4. Accuracy results using 13 features & 10-fold cross-validation Figure 5. Confusion Matrix results using 13 features & 10-fold cross-validation Predicted U1 U2 U3 U4 1912 5 3 0 U1 Actual 4 3031 7 3 U2 0 2 3441 0 U3 1 3 12 3431 U4 (a) KNN Classifier Predicted U1 U2 U3 U4 1919 0 0 1 U1 Actual 0 3044 0 1 U2 1 0 3442 0 U3 22 0 0 3425 U4 (b) Naïve Bayes Classifier Predicted U1 U2 U3 U4 1919 0 0 1 U1 Actual 0 3044 0 1 U2 1 0 3442 0 U3 22 0 0 3425 U4
  • 8. International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018 8 However, by using the Relieff algorithm for feature selection, we reduced the feature space to the first six features and then to the first four features and compared between the results for different algorithms. The accuracy and the confusion matrix results using only the first four features are shown in Figures 6 and 7 respectively for the three algorithms. The results show that there is a reduction in the accuracy of prediction for the J48 algorithm compared to the other algorithms, but it is still a high rang of accuracy. This result show that we can still classify the users with high accuracy with reducing the collected and processed dataset. This will be important for real-time process to speed up the process of learning and classification. Figure 6. Classification accuracy results using the first four features & 10-fold cross-validation Predicted U1 U2 U3 U4 1905 14 0 1 U1 Actual 24 3007 5 9 U2 2 2 3437 2 U3 0 2 8 3437 U4 (a) KNN Classifier Predicted U1 U2 U3 U4 1910 7 0 3 U1 Actual 65 2980 0 0 U2 0 0 3443 0 U3 6 25 5 3411 U4 (b) Naïve Bayes Classifier
  • 9. International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018 9 Figure 7. Confusion Matrix results using the first four features & 10-fold cross-validation 4. CONCLUSION AND FUTURE WORK The goal of this research project is to propose a smart approach for the problem of behavior-based security of mobile devices using machine learning techniques. We focused on the problem of anomaly detection, but the proposed approach has possible applications in many other areas to identify the mobile users by learning the behavior of using the mobile devices. An Android application was used to collect location and behavior data of mobile users to build a behavior-based security system. The Relieff feature ranking algorithm was used effectively to reduce the dimension and the volume of the collected data. Different algorithms were used to analyze the behavior data of mobile users. Our initial experimental results show that the proposed techniques can be used to model the behavior of mobile users and identify the mobile users based on behavior data with a high accuracy and a reduced set of collected data. Future work includes improving the overall performance and considering the most relevant features based on the mobile user. We need to test multiple users on the same device and we expect that would provide useful data. We also need to consider more users and other possible applications of the proposed techniques to provide new identity-based applications and services. REFERENCES [1] Nayeem Islam, Saumitra Das, and Yin Chen, “On-Device Mobile Phone Security Exploits Machine Learning”, IEEE Pervasive Computing, vol. 16, Issue 2, pp. 92-96, April-June 2017. [2] Khurram Majeed, Yanguo Jing, Dusica Novakovic, and Karim Ouazzane, "Behaviour Based Anomaly Detection for Smartphones Using Machine Learning Algorithm", Proceedings of the International conference on Computer Science and Information Systems (ICSIS’2014), pp. 67-73, 2014. [3] Ashkan Shamili, Christian Bauckhage, and Tansu Alpcan, “Malware Detection on Mobile Devices Using Distributed Machine Learning”, Proceedings of the 20th International Conference on Pattern Recognition, pp. 4348 – 4351, 2010. [4] M. Waqar Afridi, Toqeer Ali, Turki Alghamdi, Tamleek Ali, and Muhammad Yasar, “Android Application Behavioral Analysis Through Intent Monitoring”, Proceedings of the 6th International Symposium on Digital Forensic and Security (ISDFS), pp. 1-8, 2018. Predicted U1 U2 U3 U4 1872 39 1 8 U1 Actual 26 2969 38 12 U2 7 7 3418 11 U3 5 46 2 3394 U4 (c) J48 Decision Tree Classifier
  • 10. International Journal of Artificial Intelligence and Applications (IJAIA), Vol.9, No.4, July 2018 10 [5] Saba Arshad, Munam Shah, Abdul Wahid, Amjad Mehmood, Houbing Song, and Hongnian Yu, “SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System”, IEEE Access, vol. 6, pp. 4321-4339, January 2018. [6] A. Saracino, D. Sgandurra, G. Dini, and F. Martinelli, ‘‘MADAM: Effective and efficient behavior- based android malware detection and prevention,’’ IEEE Transactions on Dependable and Secure Computing., vol. 15, no. 1, pp. 83-97, Jan-Feb. 2018. [7] Huaqing Lin, Zheng Yan, Yu Chen, and Lifang Zhang, “A Survey on Network Security-Related Data Collection Technologies”, Huaqing Lin, Zheng Yan, Yu Chen, and Lifang Zhang, IEEE Access, vol. 6, pp. 18345-18365, January 2018. [8] Zahra Bazrafshan, Hashem Hashemi, Seyed Mehdi Hazrati Fard, and Ali Hamzeh, “A survey on heuristic malware detection techniques”, Proceedings of the 5th Conference on Information and Knowledge Technology (IKT), pp.113-120, 2013. [9] Kantardzic, M. “Data-Mining Concepts, in Data Mining: Concepts, Models, Methods, and Algorithms”, Second Edition, John Wiley & Sons, Inc., 2011. [10] Kononenko, I., E. Simec, and M. Robnik- Sikonja, “Overcoming the Myopia of Inductive Learning Algorithms with RELIEFF”, Applied Intelligence, vol 7, pp. 39–55, 1997. [11] M. Robnik-Sikonja, and I. Kononenko, “Theoretical and empirical analysis of ReliefF and RReliefF. Machine Learning”, vol. 53, pp. 23-69, 2003. [12] K. Kira and L. Rendell, “A practical approach to feature selection”, Proceedings of the 9th International Conference on Machine Learning, Morgan Kaufmann, pp.249-256, 1992. [13] K. Kira and L. Rendell, “The feature selection problem: traditional methods and new algorithm”, Proceedings of the 10th National Conference on Artificial Intelligence (AAAI 92), pp. 129-134, 1992. [14] Weka 3 - Data Mining with Open Source Machine Learning Software in Java. [Online]. Available: http://www.cs.waikato.ac.nz/ml/weka/