SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 205
Local Security Enhancement and Intrusion Prevention in
Android Devices
Santhosh Voruganti1, Mohd Muawiz Siddiqui 2, Jallawaram Abhishek3, Karnati Ramyakrishna4
1Asst.Prof, IT Department CBIT Hyderabad
2Student, IT Department CBIT Hyderabad
3Student, IT Department CBIT Hyderabad
4Student, Osmania University Hyderabad
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Android smart phones amount to 82% of the
devices in the smartphone market. Every year there are
more than 500 million new handsets sold, thereby granting
Android the monopoly in the smartphone market. With an
exponential increase in the number of users the risks
associated with the phones also increases exponentially. In
this paper, we use earlierapproachesofhost-basedintrusion
detection systems and behavior-based intrusion prevention
systems for Androidsmartphonestodesignandimplementa
host-based, behavior-based intrusionpreventionsystem, for
Android smartphones. Our system uses net flow based
clustering to identify anomalies and correlates further with
the host-based features to verify malware intrusions in the
Android system. Our goal is to provide versatile security for
Android smartphones, offering detection of a wide range of
attacks including denial of service attacks and probing. The
system should be able to detect new attacks as well, thus
providing scope for extending the method to other security
solutions.
Key Words: Android; Host-Based; Behaviour-Based
Information Security; Intrusion Prevention;LogitBoost.
1. INTRODUCTION
The global telephony industry is witnessing an on- going
proliferation of smartphones. A smartphone is an advanced
mobile communication and a computing device which is
shaping the way we communicate process and store
information at work, at home andonthemove.Smartphones
are no longer mere voice communication devices. The
considerable processing and storage capabilitiesare making
their users to store and process private and business data.
Data associated with these activities have significant value
and over the recent years, smartphones are becoming an
increasingly interesting target for cyber-criminalsdueto the
wealth of personal data in them.
Over the past years, smartphone marketsharehasincreased
rapidly and currently Android smartphones are dominating
the smartphones. The popularity of Android open platform
and the relative ease of programmability is making Android
platform the lead malware target as well. However, this is
possibly due to the unregulated third-party app stores for
Android. Cybercriminals find the motivation to exploit
smartphones as they store a wealth of personal data. Users
tend to store more of their personal data on their
smartphones, than on PCs; such as photos, videos, SMS,
emails, and banking/shopping apps. Therefore, in this
mobile computing era, protecting the safety of the
smartphones is a top priority.
The advanced mobile communication devices such as smart
phones are changing the way in which we communicate
process and store data from any place. They evolved from
simple mobile phones into sophisticated and yet compact
mini computers. They are not just voice communication
devices. Apart from browsing internet these devices can
receive email send MMS messages, exchange information by
connecting to other devices. They are also equipped with
operating system, text editors, spreadsheet editors and
database processors. As the capabilities of mobile devices
evolve, their usage for processing and storing private and
business data is likely to increase. Currently 200 million
users are using smart phones worldwide and the number of
people using smart phones will likely to increase to 1 billion
in the next 2 years. That is approximately one sixth of the
world population and equivalent to population of India.
As these devices can allow third party software’s to run on
them they are vulnerable to various threats like viruses,
malware, worms and Trojan horses.Alsoa mobiledevice can
initiate communication on anyone of its communication
interfaces and also can connect to wide variety of wireless
networks. Intrusion prevention mechanisms such as
encryption, authentication alone cannot improve the
security of the system. Already existing desktop based
Intrusion Detection software’s may not be good for mobile
systems because of the memory consumption rate and
power consumption. We need to come up with Intrusion
detection systems that will not only improve the security of
these systems but also reduce the processing overheadfrom
the system.
In this paper, we aim to successfully overcome the
shortcomings of existing systems i.e. Host-Based Intrusion
Detection and Behavior Based intrusion Detection. A host-
based system is faster and allows mobility of devices, thus
making it a more feasible design trait for smart phones. A
behavior based system is employedbecauseitusesa learned
pattern of normal network packets to identify active
intrusion attempts and can adapt to new and original
attacks, unlike knowledge-basedsystems.In behavior-based
systems, feature reductionandselectionreducesthenumber
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 206
of features given to the classifier, thus improving classifier
accuracy. The application uses PCA for feature reduction,
thus improving the classifier’s accuracy considerably.
Moreover, all the prevailing host- based systems detect
device-dependent metrics and malware.
2. LITERATURE SURVEY
2.1 Host-based Intrusion Detection
A host-based IDS is capable of monitoring all or parts of the
dynamic behavior and the state of a computer system,based
on how it is configured. Besides such activities as
dynamically inspecting network packets targeted at this
specific host (optional component with most software
solutions commerciallyavailable),a HIDSmightdetectwhich
program accesses what resources and discover that, for
example, a word- processor has suddenly and inexplicably
started modifying the system passworddatabase.Similarlya
HIDS might look at the state of a system, its stored
information, whether in RAM, in the file system, log files or
elsewhere; and check that the contents of these appear as
expected, e.g. have not been changed by the intruders.
Ideally a HIDS works in conjunction with a NIDS, such that a
HIDS finds anything that slips past the NIDS. Commercially
available software solutions often do correlate the findings
from NIDS and HIDS in order to find out about whether a
network intruder has been successful or not at the targeted
host. Most successful intruders, on entering a target
machine, immediately apply best-practice security
techniques to secure the system which they have infiltrated,
leaving only their own backdoor open, so that other
intruders cannot take over their computers.
2.2 Behavior-based Intrusion Detection
Most security monitoring systems utilize a signature- based
approach to detect threats. They generally monitor packets
on the network and look for patterns in the packets which
match their database of signatures representing pre-
identified known security threats. Behavior analysis
detection-based systems are particularlyhelpful indetecting
security threat vectors in 2 instanceswheresignature-based
systems cannot (i) new zero- day attacks(ii)whenthethreat
traffic is encrypted such as the command and control
channel for certain Botnets.
A Behavior analysis detection program tracks critical
network characteristics in real time and generates an alarm
if a strange event or trend is detected that could indicate the
presence of a threat. Large-scale examples of such
characteristics include traffic volume, bandwidth use and
protocol use.
Behavior analysis detection solutions can also monitor the
behavior of individual network subscribers. In order for
behavior analysis detection to be optimally effective a
baseline of normal network or user behavior must be
established over a period of time. Once certain parameters
have been defined as normal, any departure from one or
more of them is flagged as anomalous.
Behavior analysis detection should be used in addition to
conventional firewalls and applications for the detection of
malware. Some vendors have begun to recognize this factby
including Behavior analysis detection programs as integral
parts of their network security packages.
2.3 Summary
The advantages and limitations of the studied systems lead
to the following observations. A host-based system is faster
and allows mobility of devices, thus making it a more
feasible design trait for smart phones. A behavior based
system is employed because it uses a learned pattern of
normal network packetstoidentifyactiveintrusionattempts
and can adapt to new andoriginal attacks,unlikeknowledge-
based systems. In behavior-basedsystems,featurereduction
and selection reduces the number of features given to the
classifier, thus improving classifier accuracy. Our model
improves the existing version of ‘Protego: A passive
Intrusion Detection System for Android Devices. We use the
same architecture and the procedure as Protego but the
implementation is improved. While Protego has anaccuracy
of 92% using AdaBoost o build the classifier, our model has
an accuracy of 97.8845% using Logit Boost algorithm.
Another drawback of Protego that our model overcomes is
that it could only detect any intrusions while our model can
even stop the intrusions as soon as they are detected.
3. MODEL OVERVIEW
The proposed system is a behavior-based, host-based,
passive intrusion detection system. We first remove the
unnecessary attributes from the NSL-KDD dataset in the
preprocess stage. WethenusePrincipal ComponentAnalysis
to reduce features of the dataset. The generation of the
packet capture file allows the application of feature
reduction using principal components analysis. The system
architecture of our model is same as Protego and has been
depicted in Fig- 1. It consists of 5 subparts, organized in
three basic modules:
 Classifier Training
 Packet Capture and Analysis
 Packet Classification
3.1 Classifier Training
The idea of training a classifier stems from the fundamental
concept of supervised learning. Supervised learning is the
machine learning task of inferring a function from labelled
data. A classifier is an algorithm which allows one to define
categories of nodes. An integral part of training theclassifier
is a predefined training set, which in this case is a modified
version of the NSL-KDD dataset (reduced to suittheneedsof
smartphones). By running the dataset through the classifier
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 207
to train it, you can then run that trained classifier on
unknown nodes or records to determine which class that
node belongs to.
3.1.1 Classifier algorithm:
As accuracy is of utmost importance in intrusion detection
systems, we decided to use an ensemble approach for
classification. This is a compositemodel,madeupofmultiple
classifiers which vote, and returns a class label prediction
based on the collection of votes. After evaluating multiple
classifier models for their accuracy, we zeroed in on Logit
Boost (adds a cost functional of logistic regression,) as the
classification algorithm, as it gave 97.982% accuracy.
3.2 Packet Capture and Analysis
Feature reduction is usedfor reductionofdimensionsofdata
having high dimensionality. It consists of feature selection
and feature extraction. Feature selection is a process of
selecting a subset of features and discarding the features
which are redundant or have a comparatively low or no
information gain. This results in data with reduced
dimensionality and thus increases efficiency of machine
learning algorithms. We chose principal componentanalysis
(PCA) to reduce the dimensionality of the data,asithasbeen
widely applied to datasets in various scientific domains.PCA
is a linear dimensionality reduction technique which
explains the variance covariance structure of a set of
variables, through a few new variables, that are linear
combinations of the original variables.Thenewvariablesare
obtained from the eigenvalues and eigenvectors of the data
covariance matrix. The data is first normalized and its
standard deviation is calculated. In the next step, eigen
analysis is performed on the create independent
orthonormal eigenvalue, eigenvector pairs.
Finally, the sets of principal components sortbyEigenvalue
in descending order. The eigenvalue is a relative measure of
the variance of its corresponding eigenvectors. We
implemented our system by using different sets of the most
significant features generated by PCA. The accuracy was
found to be consistent for 10 or more most significant
features i.e. 97.9865%. Thus, in the final version of the static
application, we have selected the 10 most significant
features obtained as a result of PCA.
3.3 Packet Classification
Before the records are classified, the trained model of the
classifier - which was saved while training - is loaded. The
connection records are then fed to the classifier. Based on
this trained model, each of the record is then classified into
two categories viz. normal and anomaly.
Fig-1: Architecture of the Model
4. IMPLEMENTATION
4.1 Hardware
The models for AdaBoost and LogitBoost are compared on
WEKA, a data mining tool. The model is testedonanAndroid
device running on Two Android smart phones running on
Lollipop (5.0.2) the hardware specificationofthephoneisas
follows:
• CPU- Dual-core 1.3 GHz (Cortex-A7)
• GPU- Mali 400
• RAM- 1GB
The hardware specification of the system to build and
compare the models is as follows;
• CPU- Intel core I5
• GPU- NVIDIA GEFORCE 680
• RAM- 8GB
4.2 Software
Android Studio 1.1 wasused forthedevelopmentandtesting
of our model. Our model requires that the phone has a root
access. We used tcpdump version3.9.8 to sniff packets.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 208
Tcpdump is a command line tool which prints the
description of contents of packets on a network interface.
Busybox has been used for exploiting Unix tools. We use
Weka, a machine learning tool used for data mining, for
building and comparing the for the Android platform.
4.3 Dataset Description
In our classifier, we used the NSL-KDD data set, as it has
solved someof the inherent problemsoftheKDDCUP’99data
set, which is a benchmark data set for evaluating intrusion
detection systems. The training data set consists of 125,973
single connection vectors, each of which contain 41 features
and is labeled as a normal or an attack vector. However, 13
features, like ‘root_shell’, ‘su_attempted’, ‘num_file_creation’,
etc., are not related to smartphones and hence needed to be
removed from the dataset to be relevant to our system.
Removing these features manually could be done without
affecting the training set as the features had low relevance
and information gain.
Fig-2: Dataset Description
The above figure gives a brief description of the various
attributes selected in the dataset. Out of the 41 attributes
present in the NSL-KDD dataset, we remove 13 attributes
which are not necessary in an android environment.
4.4 Model Creation
The Dataset is modified to suit the needs of an android
device. After removing the attributes that are no longer
required, Principal Component Analysis is done on the
Dataset.
Once PCA is done on the Dataset we proceed to build the
model for the classifier. We use Logit Boost algorithm to
ensure maximum accuracy. The model is tested for varying
number of iterations and the most accurate case is taken.
Fig -3: Principal Component Analysis done on Dataset
Sample paragraph Define abbreviations and acronyms the
first time they are used in the text, even after they have been
defined in the abstract. Abbreviations such as IEEE, SI, MKS,
CGS, sc, dc, and rms do not have to be defined. Do not use
abbreviations in the title or heads unless they are
unavoidable.
Fig-4: Working of the Algorithm to build the model
We compare the results between AdaBoost and Logit Boost
for various iterations and the results are tabulated in the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 209
form of a graph. Our assumption that Logit Boost is more
accurate is proved to be true.
In the above figure, the Logit Boost algorithm is being used.
We calculate Root Mean Square Error, Relative Absolute
Error as well as Root Relative Squared Error. The detailed
accuracy gives the True Positive, False Positive, Precision,
Recall and other metrics to better understand the accuracy.
5. TESTING AND RESULTS
5.1 Evaluation
In order to evaluate the implementation of our model, we
executed the application and checked the results.
Fig-5: Loading the dataset
The above figure illustrates the loading screen and the
options for loading the dataset into the WEKA tool.
Fig-6: Accuracy for 25 iterations (97.8845%)
Fig-7: Performing LogitBoost in AndroidDevice
Fig-8: Building Model in Android device
In the above 2 figures, we redo the process of building the
model for the classifier in the android device. We use an
extension of WEKA for Android devices to facilitate this.
5.2 Results
The system correctly classifies the respective data with an
accuracy of 97.8845%. The number of iterations and their
corresponding accuracies are as follows:
• 10 features: 96.4199%
• 20 features: 97.3606%
• 25 features: 97.8845%
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 210
A graph comparing the accuracyofAdaBoostandLogitBoost
is shown in Fig- 9.
5.3 Discussion
Although Protego isanefficientintrusiondetectionsystem,it
fails to prevent those intrusions and our model overcomes
this limitation.
Intrusion prevention: Our model can successfully prevent
the preassigned set of intrusionstryingtoattack theAndroid
Dataset. The Application gives a toast whenever any such
intrusion is detected.
In the below graph we compare the accuracy between
AdaBoost and LogitBoost algorithms. The X axis denotes the
number of iterations and the Y axis gives the accuracy. From
the graph we can conclude that with an increase in the
number of iterations the accuracy of both AdaBoost and
LogitBoost algorithms increase. But in comparison to
AdaBoost algorithm (denoted by the green line), LogitBoost
algorithm (denoted by the red line) is more accurate for
every case which is studied.
Fig-9: Comparison between LogitBoost and AdaBoost
6. CONCLUSIONS AND FUTURE SCOPE
In this work, we present a novel intrusion prevention
method on Android smartphones. The system captures
network traffic and classifies it to detect intrusions and
unauthorized network activity on the host. The key focus of
the study was to develop a system which could accurately
detect any deviation from normal activity and cope with
changing systembehaviour, whileimposinglessoverheadon
the host system. The developed system is robustly able to
detect denial of service attacks and probing attacks with an
accuracy of 97.8845 %. The idea presentedalbeitnot radical,
more exploration is clearly required. We think that this
system design would ameliorate the current smartphone
security scenario. For future research directions, we believe
that the system can be used in various environments, thus
allowing a customizedapproachtosecurityforsmartphones.
The main limitation of this paper is that we need root access
for running this app. The scope of this application can be
extended so as to analyze real time data streams and torrent
data packets. We can also include a provision to check the
packets in a network connection in real time.
REFERENCES
[1].Prachi Joshi “Protego: A Passive Intrusion Detection
System for Android Smartphones”, 2016 International
Conference on Computing, Analytics and Security Trends
(CAST), Dec 2016.
[2].Dimitrios Damopoulos, “Intrusion Detection and
Prevention Systems for Mobile Devices: Design and
Development,” Ph.D. Thesis, Dept. of Information and
Communication Systems Engineering, University of the
Aegean, Greece, 2013
[3].Sherif, Joseph S., and Tommy G. Dearmond. "Intrusion
detection: systems and models." In 2012 IEEE 21st
International Workshop on Enabling Technologies:
Infrastructure for Collaborative Enterprises, pp. 115- 115.
IEEE Computer Society, 2002.
[4].Gupta, Kapil Kumar. “Robust and efficient intrusion
detection systems.”, Ph.D. Thesis, Department of Computer
Science and Software Engineering, University of Melbourne,
2009.
[5].Sanchez, Jaime. Building Android IDS on Network Level.
DEFCON 21, 2013.
[6].Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer,
and Yael Weiss. “Andromaly:a behavioral malwaredetection
framework for android devices”. Journal of Intelligent
Information Systems, pages 1–30, 2011. 10.1007/s10844-
010-0148-x.
[7].Dini, Gianluca, Fabio Martinelli, Andrea Saracino, and
Daniele Sgandurra. "Madam: a multi-level anomaly detector
for android malware." In Computer Network Security, pp.
240-253. Springer Berlin Heidelberg, 2012
[8].Adigun, Abimbola Adebisi, Temitayo Matthew Fagbola,
and Adekanmi Adegun. "SwarmDroid: Swarm Optimized
Intrusion Detection System for the Android Mobile
Enterprise." International Journal of Computer Science
Issues (IJCSI) 11, no. 3 (2014).
[9].Elrawy, Mohamed Faisal, T. K. Abdelhamid, and A. M.
Mohamed. "IDS in Telecommunication Network UsingPCA."
arXiv preprint arXiv: 1308.2779 (2013).
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 211
[10].Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard
Pfahringer, Peter Reutemann, Ian H. Witten;TheWEKAData
Mining Software: An Update; SIGKDD Explorations, Volume
11, Issue 1. (2009).
[11].Tavallaee, Mahbod, Ebrahim Bagheri, WeiLu,andAli-A.
Ghorbani. "A detailed analysis of the KDD CUP 99 data set."
In Proceedings of the Second IEEE Symposium on
Computational Intelligence for Security and Defence
Applications 2009. (2009).
[12].Kayacik, H. Günes, A. NurZincir-Heywood,andMalcolm
I. Heywood. "Selecting features for intrusion detection: A
feature relevance analysis on KDD 99 intrusion detection
datasets." Proceedings of the third annual conference on
privacy, security and trust. (2005).

Más contenido relacionado

La actualidad más candente

Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsEswar Publications
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemIOSR Journals
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computingijsrd.com
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIRJET Journal
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET Journal
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detectioneditor1knowledgecuddle
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewIJERA Editor
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetIRJET Journal
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksAM Publications,India
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetijctet
 
Intelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsIntelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsAM Publications,India
 
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsData Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsMelissa Lim
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

La actualidad más candente (20)

Security Solutions against Computer Networks Threats
Security Solutions against Computer Networks ThreatsSecurity Solutions against Computer Networks Threats
Security Solutions against Computer Networks Threats
 
A Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection SystemA Study on Recent Trends and Developments in Intrusion Detection System
A Study on Recent Trends and Developments in Intrusion Detection System
 
A Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud ComputingA Collaborative Intrusion Detection System for Cloud Computing
A Collaborative Intrusion Detection System for Cloud Computing
 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 
Efficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion DetectionEfficient String Matching Algorithm for Intrusion Detection
Efficient String Matching Algorithm for Intrusion Detection
 
Security Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A ReviewSecurity Issues and Challenges in Internet of Things – A Review
Security Issues and Challenges in Internet of Things – A Review
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
 
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 DatasetAugment Method for Intrusion Detection around KDD Cup 99 Dataset
Augment Method for Intrusion Detection around KDD Cup 99 Dataset
 
Towards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc NetworksTowards the security issues in Mobile Ad Hoc Networks
Towards the security issues in Mobile Ad Hoc Networks
 
Retail
Retail Retail
Retail
 
Enhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 datasetEnhanced method for intrusion detection over kdd cup 99 dataset
Enhanced method for intrusion detection over kdd cup 99 dataset
 
Intelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack DetectionsIntelligent Network Surveillance Technology for APT Attack Detections
Intelligent Network Surveillance Technology for APT Attack Detections
 
C02
C02C02
C02
 
Data Sheet_What Darktrace Finds
Data Sheet_What Darktrace FindsData Sheet_What Darktrace Finds
Data Sheet_What Darktrace Finds
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 

Similar a IRJET- Local Security Enhancement and Intrusion Prevention in Android Devices

IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...IRJET Journal
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIRJET Journal
 
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection SystemA Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection SystemLindsey Sais
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSIJNSA Journal
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSIJNSA Journal
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningVenkat Projects
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...IJNSA Journal
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...IJCSIS Research Publications
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMIRJET Journal
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceCamilo Fandiño Gómez
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 

Similar a IRJET- Local Security Enhancement and Intrusion Prevention in Android Devices (20)

IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
 
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
 
Intrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning AlgorithmIntrusion Detection System using AI and Machine Learning Algorithm
Intrusion Detection System using AI and Machine Learning Algorithm
 
A Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection SystemA Study On Recent Trends And Developments In Intrusion Detection System
A Study On Recent Trends And Developments In Intrusion Detection System
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
I want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdfI want you to Read intensively papers and give me a summary for ever.pdf
I want you to Read intensively papers and give me a summary for ever.pdf
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
an efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learningan efficient spam detection technique for io t devices using machine learning
an efficient spam detection technique for io t devices using machine learning
 
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
AN ISP BASED NOTIFICATION AND DETECTION SYSTEM TO MAXIMIZE EFFICIENCY OF CLIE...
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
A017360104
A017360104A017360104
A017360104
 
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
A Hybrid Intrusion Detection System for Network Security: A New Proposed Min ...
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
Whitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security IntelligenceWhitepaper IBM Qradar Security Intelligence
Whitepaper IBM Qradar Security Intelligence
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Último (20)

Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

IRJET- Local Security Enhancement and Intrusion Prevention in Android Devices

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 205 Local Security Enhancement and Intrusion Prevention in Android Devices Santhosh Voruganti1, Mohd Muawiz Siddiqui 2, Jallawaram Abhishek3, Karnati Ramyakrishna4 1Asst.Prof, IT Department CBIT Hyderabad 2Student, IT Department CBIT Hyderabad 3Student, IT Department CBIT Hyderabad 4Student, Osmania University Hyderabad ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Android smart phones amount to 82% of the devices in the smartphone market. Every year there are more than 500 million new handsets sold, thereby granting Android the monopoly in the smartphone market. With an exponential increase in the number of users the risks associated with the phones also increases exponentially. In this paper, we use earlierapproachesofhost-basedintrusion detection systems and behavior-based intrusion prevention systems for Androidsmartphonestodesignandimplementa host-based, behavior-based intrusionpreventionsystem, for Android smartphones. Our system uses net flow based clustering to identify anomalies and correlates further with the host-based features to verify malware intrusions in the Android system. Our goal is to provide versatile security for Android smartphones, offering detection of a wide range of attacks including denial of service attacks and probing. The system should be able to detect new attacks as well, thus providing scope for extending the method to other security solutions. Key Words: Android; Host-Based; Behaviour-Based Information Security; Intrusion Prevention;LogitBoost. 1. INTRODUCTION The global telephony industry is witnessing an on- going proliferation of smartphones. A smartphone is an advanced mobile communication and a computing device which is shaping the way we communicate process and store information at work, at home andonthemove.Smartphones are no longer mere voice communication devices. The considerable processing and storage capabilitiesare making their users to store and process private and business data. Data associated with these activities have significant value and over the recent years, smartphones are becoming an increasingly interesting target for cyber-criminalsdueto the wealth of personal data in them. Over the past years, smartphone marketsharehasincreased rapidly and currently Android smartphones are dominating the smartphones. The popularity of Android open platform and the relative ease of programmability is making Android platform the lead malware target as well. However, this is possibly due to the unregulated third-party app stores for Android. Cybercriminals find the motivation to exploit smartphones as they store a wealth of personal data. Users tend to store more of their personal data on their smartphones, than on PCs; such as photos, videos, SMS, emails, and banking/shopping apps. Therefore, in this mobile computing era, protecting the safety of the smartphones is a top priority. The advanced mobile communication devices such as smart phones are changing the way in which we communicate process and store data from any place. They evolved from simple mobile phones into sophisticated and yet compact mini computers. They are not just voice communication devices. Apart from browsing internet these devices can receive email send MMS messages, exchange information by connecting to other devices. They are also equipped with operating system, text editors, spreadsheet editors and database processors. As the capabilities of mobile devices evolve, their usage for processing and storing private and business data is likely to increase. Currently 200 million users are using smart phones worldwide and the number of people using smart phones will likely to increase to 1 billion in the next 2 years. That is approximately one sixth of the world population and equivalent to population of India. As these devices can allow third party software’s to run on them they are vulnerable to various threats like viruses, malware, worms and Trojan horses.Alsoa mobiledevice can initiate communication on anyone of its communication interfaces and also can connect to wide variety of wireless networks. Intrusion prevention mechanisms such as encryption, authentication alone cannot improve the security of the system. Already existing desktop based Intrusion Detection software’s may not be good for mobile systems because of the memory consumption rate and power consumption. We need to come up with Intrusion detection systems that will not only improve the security of these systems but also reduce the processing overheadfrom the system. In this paper, we aim to successfully overcome the shortcomings of existing systems i.e. Host-Based Intrusion Detection and Behavior Based intrusion Detection. A host- based system is faster and allows mobility of devices, thus making it a more feasible design trait for smart phones. A behavior based system is employedbecauseitusesa learned pattern of normal network packets to identify active intrusion attempts and can adapt to new and original attacks, unlike knowledge-basedsystems.In behavior-based systems, feature reductionandselectionreducesthenumber
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 206 of features given to the classifier, thus improving classifier accuracy. The application uses PCA for feature reduction, thus improving the classifier’s accuracy considerably. Moreover, all the prevailing host- based systems detect device-dependent metrics and malware. 2. LITERATURE SURVEY 2.1 Host-based Intrusion Detection A host-based IDS is capable of monitoring all or parts of the dynamic behavior and the state of a computer system,based on how it is configured. Besides such activities as dynamically inspecting network packets targeted at this specific host (optional component with most software solutions commerciallyavailable),a HIDSmightdetectwhich program accesses what resources and discover that, for example, a word- processor has suddenly and inexplicably started modifying the system passworddatabase.Similarlya HIDS might look at the state of a system, its stored information, whether in RAM, in the file system, log files or elsewhere; and check that the contents of these appear as expected, e.g. have not been changed by the intruders. Ideally a HIDS works in conjunction with a NIDS, such that a HIDS finds anything that slips past the NIDS. Commercially available software solutions often do correlate the findings from NIDS and HIDS in order to find out about whether a network intruder has been successful or not at the targeted host. Most successful intruders, on entering a target machine, immediately apply best-practice security techniques to secure the system which they have infiltrated, leaving only their own backdoor open, so that other intruders cannot take over their computers. 2.2 Behavior-based Intrusion Detection Most security monitoring systems utilize a signature- based approach to detect threats. They generally monitor packets on the network and look for patterns in the packets which match their database of signatures representing pre- identified known security threats. Behavior analysis detection-based systems are particularlyhelpful indetecting security threat vectors in 2 instanceswheresignature-based systems cannot (i) new zero- day attacks(ii)whenthethreat traffic is encrypted such as the command and control channel for certain Botnets. A Behavior analysis detection program tracks critical network characteristics in real time and generates an alarm if a strange event or trend is detected that could indicate the presence of a threat. Large-scale examples of such characteristics include traffic volume, bandwidth use and protocol use. Behavior analysis detection solutions can also monitor the behavior of individual network subscribers. In order for behavior analysis detection to be optimally effective a baseline of normal network or user behavior must be established over a period of time. Once certain parameters have been defined as normal, any departure from one or more of them is flagged as anomalous. Behavior analysis detection should be used in addition to conventional firewalls and applications for the detection of malware. Some vendors have begun to recognize this factby including Behavior analysis detection programs as integral parts of their network security packages. 2.3 Summary The advantages and limitations of the studied systems lead to the following observations. A host-based system is faster and allows mobility of devices, thus making it a more feasible design trait for smart phones. A behavior based system is employed because it uses a learned pattern of normal network packetstoidentifyactiveintrusionattempts and can adapt to new andoriginal attacks,unlikeknowledge- based systems. In behavior-basedsystems,featurereduction and selection reduces the number of features given to the classifier, thus improving classifier accuracy. Our model improves the existing version of ‘Protego: A passive Intrusion Detection System for Android Devices. We use the same architecture and the procedure as Protego but the implementation is improved. While Protego has anaccuracy of 92% using AdaBoost o build the classifier, our model has an accuracy of 97.8845% using Logit Boost algorithm. Another drawback of Protego that our model overcomes is that it could only detect any intrusions while our model can even stop the intrusions as soon as they are detected. 3. MODEL OVERVIEW The proposed system is a behavior-based, host-based, passive intrusion detection system. We first remove the unnecessary attributes from the NSL-KDD dataset in the preprocess stage. WethenusePrincipal ComponentAnalysis to reduce features of the dataset. The generation of the packet capture file allows the application of feature reduction using principal components analysis. The system architecture of our model is same as Protego and has been depicted in Fig- 1. It consists of 5 subparts, organized in three basic modules:  Classifier Training  Packet Capture and Analysis  Packet Classification 3.1 Classifier Training The idea of training a classifier stems from the fundamental concept of supervised learning. Supervised learning is the machine learning task of inferring a function from labelled data. A classifier is an algorithm which allows one to define categories of nodes. An integral part of training theclassifier is a predefined training set, which in this case is a modified version of the NSL-KDD dataset (reduced to suittheneedsof smartphones). By running the dataset through the classifier
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 207 to train it, you can then run that trained classifier on unknown nodes or records to determine which class that node belongs to. 3.1.1 Classifier algorithm: As accuracy is of utmost importance in intrusion detection systems, we decided to use an ensemble approach for classification. This is a compositemodel,madeupofmultiple classifiers which vote, and returns a class label prediction based on the collection of votes. After evaluating multiple classifier models for their accuracy, we zeroed in on Logit Boost (adds a cost functional of logistic regression,) as the classification algorithm, as it gave 97.982% accuracy. 3.2 Packet Capture and Analysis Feature reduction is usedfor reductionofdimensionsofdata having high dimensionality. It consists of feature selection and feature extraction. Feature selection is a process of selecting a subset of features and discarding the features which are redundant or have a comparatively low or no information gain. This results in data with reduced dimensionality and thus increases efficiency of machine learning algorithms. We chose principal componentanalysis (PCA) to reduce the dimensionality of the data,asithasbeen widely applied to datasets in various scientific domains.PCA is a linear dimensionality reduction technique which explains the variance covariance structure of a set of variables, through a few new variables, that are linear combinations of the original variables.Thenewvariablesare obtained from the eigenvalues and eigenvectors of the data covariance matrix. The data is first normalized and its standard deviation is calculated. In the next step, eigen analysis is performed on the create independent orthonormal eigenvalue, eigenvector pairs. Finally, the sets of principal components sortbyEigenvalue in descending order. The eigenvalue is a relative measure of the variance of its corresponding eigenvectors. We implemented our system by using different sets of the most significant features generated by PCA. The accuracy was found to be consistent for 10 or more most significant features i.e. 97.9865%. Thus, in the final version of the static application, we have selected the 10 most significant features obtained as a result of PCA. 3.3 Packet Classification Before the records are classified, the trained model of the classifier - which was saved while training - is loaded. The connection records are then fed to the classifier. Based on this trained model, each of the record is then classified into two categories viz. normal and anomaly. Fig-1: Architecture of the Model 4. IMPLEMENTATION 4.1 Hardware The models for AdaBoost and LogitBoost are compared on WEKA, a data mining tool. The model is testedonanAndroid device running on Two Android smart phones running on Lollipop (5.0.2) the hardware specificationofthephoneisas follows: • CPU- Dual-core 1.3 GHz (Cortex-A7) • GPU- Mali 400 • RAM- 1GB The hardware specification of the system to build and compare the models is as follows; • CPU- Intel core I5 • GPU- NVIDIA GEFORCE 680 • RAM- 8GB 4.2 Software Android Studio 1.1 wasused forthedevelopmentandtesting of our model. Our model requires that the phone has a root access. We used tcpdump version3.9.8 to sniff packets.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 208 Tcpdump is a command line tool which prints the description of contents of packets on a network interface. Busybox has been used for exploiting Unix tools. We use Weka, a machine learning tool used for data mining, for building and comparing the for the Android platform. 4.3 Dataset Description In our classifier, we used the NSL-KDD data set, as it has solved someof the inherent problemsoftheKDDCUP’99data set, which is a benchmark data set for evaluating intrusion detection systems. The training data set consists of 125,973 single connection vectors, each of which contain 41 features and is labeled as a normal or an attack vector. However, 13 features, like ‘root_shell’, ‘su_attempted’, ‘num_file_creation’, etc., are not related to smartphones and hence needed to be removed from the dataset to be relevant to our system. Removing these features manually could be done without affecting the training set as the features had low relevance and information gain. Fig-2: Dataset Description The above figure gives a brief description of the various attributes selected in the dataset. Out of the 41 attributes present in the NSL-KDD dataset, we remove 13 attributes which are not necessary in an android environment. 4.4 Model Creation The Dataset is modified to suit the needs of an android device. After removing the attributes that are no longer required, Principal Component Analysis is done on the Dataset. Once PCA is done on the Dataset we proceed to build the model for the classifier. We use Logit Boost algorithm to ensure maximum accuracy. The model is tested for varying number of iterations and the most accurate case is taken. Fig -3: Principal Component Analysis done on Dataset Sample paragraph Define abbreviations and acronyms the first time they are used in the text, even after they have been defined in the abstract. Abbreviations such as IEEE, SI, MKS, CGS, sc, dc, and rms do not have to be defined. Do not use abbreviations in the title or heads unless they are unavoidable. Fig-4: Working of the Algorithm to build the model We compare the results between AdaBoost and Logit Boost for various iterations and the results are tabulated in the
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 209 form of a graph. Our assumption that Logit Boost is more accurate is proved to be true. In the above figure, the Logit Boost algorithm is being used. We calculate Root Mean Square Error, Relative Absolute Error as well as Root Relative Squared Error. The detailed accuracy gives the True Positive, False Positive, Precision, Recall and other metrics to better understand the accuracy. 5. TESTING AND RESULTS 5.1 Evaluation In order to evaluate the implementation of our model, we executed the application and checked the results. Fig-5: Loading the dataset The above figure illustrates the loading screen and the options for loading the dataset into the WEKA tool. Fig-6: Accuracy for 25 iterations (97.8845%) Fig-7: Performing LogitBoost in AndroidDevice Fig-8: Building Model in Android device In the above 2 figures, we redo the process of building the model for the classifier in the android device. We use an extension of WEKA for Android devices to facilitate this. 5.2 Results The system correctly classifies the respective data with an accuracy of 97.8845%. The number of iterations and their corresponding accuracies are as follows: • 10 features: 96.4199% • 20 features: 97.3606% • 25 features: 97.8845%
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 210 A graph comparing the accuracyofAdaBoostandLogitBoost is shown in Fig- 9. 5.3 Discussion Although Protego isanefficientintrusiondetectionsystem,it fails to prevent those intrusions and our model overcomes this limitation. Intrusion prevention: Our model can successfully prevent the preassigned set of intrusionstryingtoattack theAndroid Dataset. The Application gives a toast whenever any such intrusion is detected. In the below graph we compare the accuracy between AdaBoost and LogitBoost algorithms. The X axis denotes the number of iterations and the Y axis gives the accuracy. From the graph we can conclude that with an increase in the number of iterations the accuracy of both AdaBoost and LogitBoost algorithms increase. But in comparison to AdaBoost algorithm (denoted by the green line), LogitBoost algorithm (denoted by the red line) is more accurate for every case which is studied. Fig-9: Comparison between LogitBoost and AdaBoost 6. CONCLUSIONS AND FUTURE SCOPE In this work, we present a novel intrusion prevention method on Android smartphones. The system captures network traffic and classifies it to detect intrusions and unauthorized network activity on the host. The key focus of the study was to develop a system which could accurately detect any deviation from normal activity and cope with changing systembehaviour, whileimposinglessoverheadon the host system. The developed system is robustly able to detect denial of service attacks and probing attacks with an accuracy of 97.8845 %. The idea presentedalbeitnot radical, more exploration is clearly required. We think that this system design would ameliorate the current smartphone security scenario. For future research directions, we believe that the system can be used in various environments, thus allowing a customizedapproachtosecurityforsmartphones. The main limitation of this paper is that we need root access for running this app. The scope of this application can be extended so as to analyze real time data streams and torrent data packets. We can also include a provision to check the packets in a network connection in real time. REFERENCES [1].Prachi Joshi “Protego: A Passive Intrusion Detection System for Android Smartphones”, 2016 International Conference on Computing, Analytics and Security Trends (CAST), Dec 2016. [2].Dimitrios Damopoulos, “Intrusion Detection and Prevention Systems for Mobile Devices: Design and Development,” Ph.D. Thesis, Dept. of Information and Communication Systems Engineering, University of the Aegean, Greece, 2013 [3].Sherif, Joseph S., and Tommy G. Dearmond. "Intrusion detection: systems and models." In 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 115- 115. IEEE Computer Society, 2002. [4].Gupta, Kapil Kumar. “Robust and efficient intrusion detection systems.”, Ph.D. Thesis, Department of Computer Science and Software Engineering, University of Melbourne, 2009. [5].Sanchez, Jaime. Building Android IDS on Network Level. DEFCON 21, 2013. [6].Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, and Yael Weiss. “Andromaly:a behavioral malwaredetection framework for android devices”. Journal of Intelligent Information Systems, pages 1–30, 2011. 10.1007/s10844- 010-0148-x. [7].Dini, Gianluca, Fabio Martinelli, Andrea Saracino, and Daniele Sgandurra. "Madam: a multi-level anomaly detector for android malware." In Computer Network Security, pp. 240-253. Springer Berlin Heidelberg, 2012 [8].Adigun, Abimbola Adebisi, Temitayo Matthew Fagbola, and Adekanmi Adegun. "SwarmDroid: Swarm Optimized Intrusion Detection System for the Android Mobile Enterprise." International Journal of Computer Science Issues (IJCSI) 11, no. 3 (2014). [9].Elrawy, Mohamed Faisal, T. K. Abdelhamid, and A. M. Mohamed. "IDS in Telecommunication Network UsingPCA." arXiv preprint arXiv: 1308.2779 (2013).
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 211 [10].Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, Ian H. Witten;TheWEKAData Mining Software: An Update; SIGKDD Explorations, Volume 11, Issue 1. (2009). [11].Tavallaee, Mahbod, Ebrahim Bagheri, WeiLu,andAli-A. Ghorbani. "A detailed analysis of the KDD CUP 99 data set." In Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009. (2009). [12].Kayacik, H. Günes, A. NurZincir-Heywood,andMalcolm I. Heywood. "Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets." Proceedings of the third annual conference on privacy, security and trust. (2005).