Abstract
Since the first handheld cellular phone was introduced in 1970s, the mobile phone has changed significantly both in terms of popularity and functionality. With more than 4.6 billion subscribers around the world, it has become a ubiquitous device in our daily life. Apart from the traditional telephony and text messaging services, people are enjoying a much wider range of mobile services over a variety of network connections in the form of mobile applications. Although a number of security mechanisms such as authentication, antivirus, and firewall applications are available, it is still difficult to keep up with various mobile threats (i.e. service fraud, mobile malware and SMS phishing); hence, additional security measures should be taken into consideration. This paper proposes a novel behaviour-based profiling technique by using a mobile user's application usage to detect abnormal mobile activities. The experiment employed the MIT Reality dataset. For data processing purposes and also to maximise the number of participants, one month (24/10/2004-20/11/ 2004) of users' application usage with a total number of 44,529 log entries was extracted from the original dataset. It was further divided to form three subsets: two intra-application datasets compiled with telephone and message data; and an inter-application dataset containing the rest of the mobile applications. Based upon the experiment plan, a user's profile was built using either static and dynamic profiles and the best experimental results for the telephone, text message, and application-level applications were an EER (Equal Error Rate) of: 5.4%, 2.2% and 13.5% respectively. Whilst some users were difficult to classify, a significant proportion fell within the performance expectations of a behavioural biometric and therefore a behaviour profiling system on mobile devices is able to detect anomalies during the use of the mobile device. Incorporated within a wider authentication system, this biometric would enable transparent and continuous authentication of the user, thereby maximising user acceptance and security.
Original language | English |
---|---|
Title of host publication | 10th European Conference on Information Warfare and Security 2011, ECIW 2011 |
Pages | 307-314 |
Number of pages | 8 |
Publication status | Published - 2011 |
Event | 10th European Conference on Information Warfare and Security 2011 - Tallinn, Estonia Duration: 7 Jul 2011 → 8 Jul 2011 |
Conference
Conference | 10th European Conference on Information Warfare and Security 2011 |
---|---|
Abbreviated title | ECIW 2011 |
Country/Territory | Estonia |
City | Tallinn |
Period | 7/07/11 → 8/07/11 |
Keywords
- Applications
- Behaviour profiling
- Mobile device
- Transparent authentication