Cost-sensitive detection of malicious applications in mobile devices

Yael Weiss, Yuval Fledel, Yuval Elovici, Lior Rokach

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Mobile phones have become a primary communication device nowadays. In order to maintain proper functionality, various existing security solutions are being integrated into mobile devices. Some of the more sophisticated solutions, such as host-based intrusion detection systems (HIDS) are based on continuously monitoring many parameters in the device such as CPU and memory consumption. Since the continuous monitoring of many parameters consumes considerable computational resources it is necessary to reduce consumption in order to efficiently use HIDS. One way to achieve this is to collect less parameters by means of cost-sensitive feature selection techniques. In this study, we evaluate ProCASH, a new cost-sensitive feature selection algorithm which considers resources consumption, misclassification costs and feature grouping. ProCASH was evaluated on an Android-based mobile device. The data mining task was to distinguish between benign and malicious applications. The evaluation demonstrated the effectiveness of ProCASH compared to other cost sensitive algorithms.

Original languageAmerican English
Title of host publicationMobile Computing, Applications, and Services - 2nd International ICST Conference, MobiCASE 2010, Revised Selected Papers
EditorsMartin Griss, Guang Yang
Place of PublicationBerlin, Heidelberg
PublisherSpringer Verlag
Pages382-395
Number of pages14
ISBN (Electronic)978-3-642-29336-8
ISBN (Print)978-3-642-29335-1
DOIs
StatePublished - 1 Jan 2012
Event2nd International Conference on Mobile Computing, Applications, and Services, MobiCASE 2010 - Santa Clara, United States
Duration: 25 Oct 201028 Oct 2010

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume76 LNICST

Conference

Conference2nd International Conference on Mobile Computing, Applications, and Services, MobiCASE 2010
Country/TerritoryUnited States
CitySanta Clara
Period25/10/1028/10/10

Keywords

  • Android
  • Intrusion detection
  • Malware
  • Mobile devices
  • Security
  • sCost sensitive feature selection

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Cost-sensitive detection of malicious applications in mobile devices'. Together they form a unique fingerprint.

Cite this