Abstract

Quite often, organizations are confronted with the burden of managing mobile device assets, requiring control over installed applications, security, usage profiles or customization options. From this perspective, the emergence of the Bring Your Own Device (BYOD) trend has aggravated the situation, making it difficult to achieve an adequate balance between corporate regulations, freedom of usage and device heterogeneity. Moreover, device and information protection on mobile ecosystems are quite different from securing other device assets such as laptops or desktops, due to their specific characteristics and limitations—quite often, the resource overhead associated with specific security mechanisms is more important for mobile devices than conventional computing platforms, as the former frequently have comparatively less computing capabilities and more strict power management policies. This paper presents an intrusion and anomaly detection framework specifically designed for managed mobile device ecosystems, that is able to integrate into mobile device and management frameworks for complementing conventional intrusion detection systems. In addition to presenting the reference architecture for the proposed framework, several implementation aspects are also analyzed, based on the lessons learned from developing a proof-of-concept prototype that was used for validation purposes.

Highlights

  • Mobile devices such as tablets and smartphones have evolved considerably over the past several years, both in terms of computing power and capabilities

  • Corporations need adequate security mechanisms for their devices and for the devices privately owned by employees but still used for professional activities—in line with the Bring Your Own Device (BYOD) [1] paradigm, which extends the possibilities of personal mobile device, but leads to issues regarding the management of security by corporations [2]

  • In this paper we present an intrusion and anomaly detection framework designed for mobile devices

Read more

Summary

Introduction

Mobile devices such as tablets and smartphones have evolved considerably over the past several years, both in terms of computing power and capabilities. As users increasingly trust them to assist their daily leisure and work routines, the amount of information produced and handled by such devices keeps increasing This scenario naturally raises security concerns, since mobile devices are an obvious target for all sorts of malicious activities, such as information exfiltration, wiretapping, and trojan infections. In this paper we present an intrusion and anomaly detection framework designed for mobile devices. This framework supports the implementation of anomaly detection mechanisms in mobile device ecosystems, in a way that is complementary to classic intrusion detection techniques, providing the means to incorporate user behaviour data, resource optimization and multi-device analysis in the specific context of mobile devices.

State-of-the-Art
Mobile Device Security Management and Monitoring
Event Processing in the Scope of Mobile Device Security
Proposed Framework
Device Agent
Implementation
Collection
Event Management
Device Agent Configuration Management within MQTT
Aggregation
Message Brokers
Why MQTT
Encryption and Security
Aggregator
Data Visualization
Dashboard
Testing and Validation
Impact of the Agent in the Mobile Device
Impact on the Network
Individual Message Analysis
Empirical Device-Level Network Traffic Overhead Analysis
Aggregated Network Traffic Overhead Analysis
Conclusions and Ongoing Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call