TY - GEN
T1 - A cloud-based intrusion detection and response system for mobile phones
AU - Houmansadr, Amir
AU - Zonouz, Saman A.
AU - Berthier, Robin
PY - 2011/9/2
Y1 - 2011/9/2
N2 - As smart mobile phones, so called smartphones, are getting more complex and more powerful to efficiently provide more functionalities, concerns are increasing regarding security threats against the smartphone users. Since smart-phones use the same software architecture as in PCs, they are vulnerable to similar classes of security risks such as viruses, trojans, and worms [6]. In this paper, we propose a cloud-based smartphone-specific intrusion detection and response engine, which continuously performs an in-depth forensics analysis on the smartphone to detect any misbehavior. In case a misbehavior is detected, the proposed engine decides upon and takes optimal response actions to thwart the ongoing attacks. Despite the computational and storage resource limitations in smartphone devices, The engine can perform a complete and in-depth analysis on the smartphone, since all the investigations are carried out on an emulated device in a cloud environment.
AB - As smart mobile phones, so called smartphones, are getting more complex and more powerful to efficiently provide more functionalities, concerns are increasing regarding security threats against the smartphone users. Since smart-phones use the same software architecture as in PCs, they are vulnerable to similar classes of security risks such as viruses, trojans, and worms [6]. In this paper, we propose a cloud-based smartphone-specific intrusion detection and response engine, which continuously performs an in-depth forensics analysis on the smartphone to detect any misbehavior. In case a misbehavior is detected, the proposed engine decides upon and takes optimal response actions to thwart the ongoing attacks. Despite the computational and storage resource limitations in smartphone devices, The engine can perform a complete and in-depth analysis on the smartphone, since all the investigations are carried out on an emulated device in a cloud environment.
UR - http://www.scopus.com/inward/record.url?scp=80052184968&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80052184968&partnerID=8YFLogxK
U2 - 10.1109/DSNW.2011.5958860
DO - 10.1109/DSNW.2011.5958860
M3 - Conference contribution
AN - SCOPUS:80052184968
SN - 9781457703751
T3 - Proceedings of the International Conference on Dependable Systems and Networks
SP - 31
EP - 32
BT - 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, DSN-W 2011
T2 - 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, DSN-W 2011
Y2 - 27 June 2011 through 30 June 2011
ER -