[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3265863.3265867acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

A Power Signal Based Dynamic Approach to Detecting Anomalous Behavior in Wireless Devices

Published: 25 October 2018 Publication History

Abstract

The health and security of wireless devices are fast gaining importance, and these are vital for effective implementation of sensor networks and Internet of Things (IoT). Any device, wired or wireless, needs a power source, and the power consumed is a consequence of its usage and functionality. In this context, this paper proposes a methodology to detect anomalous behavior of wireless devices by monitoring their power consumption patterns. The proposed methodology utilizes Independent Component Analysis (ICA) to extract information from the current power consumption of the device and generates features of the state of the device by calculating the degree of similarity of the extracted information with the known normal behavior of the device. Then, Recursive Feature Elimination (RFE) is used to select features from the generated feature vector. Finally, Classification algorithms are used to classify and detect the anomalous behavior. We have validated the methodology by emulating anomalous behavior on smartphones through a custom designed app that runs in the background while the main app is being used. Validation results indicate that the proposed methodology can be used to identify even a sparsely active malware existence with very high accuracy. The proposed model has an accuracy of 88% for a malware active for 1% of the total time and accuracy of almost 100% for malware active for 12% of the time.

References

[1]
Albasir A., James R., Naik K., and Nayak A. 2018. Using Deep Learning to Classify Power Consumption Signals of Wireless Devices: An Application to Cybersecurity. In Acoustics, Speech and Signal Processing (ICASSP), 2018 IEEE International Conference on. IEEE.
[2]
Jacoby G. A., Marchany R., and Davis N. 2004. Battery-based intrusion detection a first line of defense. In Information Assurance Workshop, 2004. Proceedings from the Fifth Annual IEEE SMC. IEEE, 272--279.
[3]
Leo B., Friedman J. H., Olshen R. A., and Stone C. J. 1984. Classification and regression trees. Wadsworth International Group (1984).
[4]
Arp D., Spreitzenbarth M., Hubner M., Gascon H., Rieck K., Siemens, and C. E. R. T. 2014. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket. In NDSS, Vol. 14. 23--26.
[5]
Lewis D. D. 1998. Naive (Bayes) at forty: The independence assumption in information retrieval. In European conference on machine learning. Springer, 4--15.
[6]
Mavroforakis M. E. and Theodoridis S. 2006. A geometric approach to support vector machine (SVM) classification. IEEE transactions on neural networks 17, 3 (2006), 671--682.
[7]
Kim H., Smith J., and Shin K. G. 2008. Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the 6th international conference on Mobile systems, applications, and services. ACM, 239--252.
[8]
Liu H., Motoda H., Setiono R., and Zhao Z. 2010. Feature selection: An ever evolving frontier in data mining. In Feature Selection in Data Mining. 4--13.
[9]
Guyon I., Weston J., Barnhill S., and Vapnik V. 2002. Gene selection for cancer classification using support vector machines. Machine learning 46, 1--3 (2002), 389--422.
[10]
Monsoon Solutions Inc. 2017. Monsoon Power Monitor. https://www.msoon.com/LabEquipment/PowerMonitor/.
[11]
Hoffmann J., Neumann S., and Holz T. 2013. Mobile malware detection based on energy fingerprints a dead end?. In International Workshop on Recent Advances in Intrusion Detection. Springer, 348--368.
[12]
Huang J., Zhang X., Tan L., Wang P., and Liang B. 2014. Asdroid: Detecting stealthy behaviors in android applications by user interface and program behavior contradiction. In Proceedings of the 36th International Conference on Software Engineering. ACM, 1036--1046.
[13]
Pereira J. 2010. Handbook of Research on Personal Autonomy Technologies and Disability Informatics. IGI Global.
[14]
Sahs J. and Khan L. 2012. A machine learning approach to android malware detection. In Intelligence and security informatics conference (eisic), 2012 european. IEEE, 141--147.
[15]
Smola A. J. and Schülkopf B. 2003. A Tutorial on Support Vector Regression. Technical Report. STATISTICS AND COMPUTING.
[16]
Buitinck L., Louppe G., Blondel M., Pedregosa F., Mueller A., Grisel O., Niculae V., Prettenhofer P., Gramfort A., Grobler J., Layton R., VanderPlas J., Joly A., Holt B., and Varoquaux G. 2013. API design for machine learning software: experiences from the scikit-learn project. arXiv preprint arXiv:1309.0238 (2013).
[17]
Liu L., Yan G., Zhang X., and Chen S. 2009. Virusmeter: Preventing your cellphone from spies. In International Workshop on Recent Advances in Intrusion Detection. Springer, 244--264.
[18]
Zhang L., Tiwana B., Qian Z., Wang Z., Dick R. P., Mao Z. M., and Yang L. 2010. Accurate online power estimation and automatic battery behavior based power model generation for smartphones. In Proceedings of the eighth IEEE/ACM/IFIP international conference on Hardware/software codesign and system synthesis. ACM, 105--114.
[19]
Mobile Marketing. 2017. http://mobilemarketingmagazine.com/24bn-smartphone-users-in-2017-says-emarketer.
[20]
S. A. Pattekari and A. Parveen. 2012. Prediction system for heart disease using Naïve Bayes. International Journal of Advanced Computer and Mathematical Sciences 3, 3 (2012), 290--294.
[21]
James R. S. R., Albasir A., Naik K., Dabbagh M. Y., Dash, P. Zaman M., and Goel N. 2017. Detection of anomalous behavior of smartphones using signal processing and machine learning techniques. In Personal, Indoor, and Mobile Radio Communications (PIMRC), 2017 IEEE 28th Annual International Symposium on. IEEE, 1--7.
[22]
Tobiyama S., Yamaguchi Y., Shimada H., Ikuse T., and Yagi T. 2016. Malware detection with deep neural network using process behavior. In Computer Software and Applications Conference (COMPSAC), 2016 IEEE 40th Annual, Vol. 2. IEEE, 577--582.
[23]
Statista. 2016. Number of smartphone users worldwide from 2014 to 2020. https://www.statista.com/statistics/330695/number-of-smartphone-users-worldwide/.
[24]
Lou V. 2010. Application behavior based malware detection. US Patent 7,779,472.
[25]
Yerima S. Y., Sezer S., McWilliams G., and Muttik I. 2016. A new android malware detection approach using bayesian classification. arXiv preprint arXiv:1608.00848 (2016).
[26]
AYŧan A. Äř. and Åřen S. 2015. API call and permission based mobile malware detection. In Signal Processing and Communications Applications Conference (SIU), 2015 23th. IEEE, 2400--2403.

Cited By

View all
  • (2023)Toward Improving the Security of IoT and CPS Devices: An AI ApproachDigital Threats: Research and Practice10.1145/34978624:2(1-30)Online publication date: 10-Aug-2023
  • (2020)TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of ThingsCluster Computing10.1007/s10586-020-03153-8Online publication date: 2-Sep-2020
  • (2019)Machine Learning Based Malware Detection in Wireless Devices Using Power Footprints2019 International Symposium on Systems Engineering (ISSE)10.1109/ISSE46696.2019.8984518(1-8)Online publication date: Oct-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiWac'18: Proceedings of the 16th ACM International Symposium on Mobility Management and Wireless Access
October 2018
140 pages
ISBN:9781450359627
DOI:10.1145/3265863
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 October 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. device health
  2. feature extraction
  3. independent component analysis
  4. machine learning
  5. security

Qualifiers

  • Research-article

Funding Sources

  • Natural Sciences and Engineering Research Council of Canada

Acceptance Rates

Overall Acceptance Rate 83 of 272 submissions, 31%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Toward Improving the Security of IoT and CPS Devices: An AI ApproachDigital Threats: Research and Practice10.1145/34978624:2(1-30)Online publication date: 10-Aug-2023
  • (2020)TempoCode-IoT: temporal codebook-based encoding of flow features for intrusion detection in Internet of ThingsCluster Computing10.1007/s10586-020-03153-8Online publication date: 2-Sep-2020
  • (2019)Machine Learning Based Malware Detection in Wireless Devices Using Power Footprints2019 International Symposium on Systems Engineering (ISSE)10.1109/ISSE46696.2019.8984518(1-8)Online publication date: Oct-2019
  • (2019)Detection of Anomalous Behavior in Wireless Devices Using Changepoint Analysis2019 IEEE International Congress on Internet of Things (ICIOT)10.1109/ICIOT.2019.00026(82-90)Online publication date: Jul-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media