Behavioral Model For Live Detection of Apps Based Attack

07/14/2022
by   Misbah Shafi, et al.
0

Smartphones with the platforms of applications are gaining extensive attention and popularity. The enormous use of different applications has paved the way to numerous security threats. The threats are in the form of attacks such as permission control attacks, phishing attacks, spyware attacks, botnets, malware attacks, privacy leakage attacks. Moreover, other vulnerabilities include invalid authorization of apps, compromise on the confidentiality of data, invalid access control. In this paper, an application-based attack modeling and attack detection is proposed. Due to A novel attack vulnerability is identified based on the app execution on the smartphone. The attack modeling involves an end-user vulnerable application to initiate an attack. The vulnerable application is installed at the background end on the smartphone with hidden visibility from the end-user. Thereby, accessing the confidential information. The detection model involves the proposed technique of an Application-based Behavioral Model Analysis (ABMA) scheme to address the attack model. The model incorporates application-based comparative parameter analysis to perform the process of intrusion detection. The ABMA is estimated by using the parameters of power, battery level, and the data usage. Based on the source internet accessibility, the analysis is performed using three different configurations as, WiFi, mobile data, and the combination of the two. The simulation results verify and demonstrates the effectiveness of the proposed model.

READ FULL TEXT

page 1

page 3

page 5

page 6

page 7

page 8

page 9

research
01/14/2019

Peel the onion: Recognition of Android apps behind the Tor Network

In this work we show that Tor is vulnerable to app deanonymization attac...
research
01/26/2020

A Survey on Smartphones Security: Software Vulnerabilities, Malware, and Attacks

Nowadays, the usage of smartphones and their applications have become ra...
research
11/28/2012

Intrusion Detection on Smartphones

Smartphone technology is more and more becoming the predominant communic...
research
01/24/2018

Exposing Vulnerabilities in Mobile Networks: A Mobile Data Consumption Attack

Smartphone carrier companies rely on mobile networks for keeping an accu...
research
01/26/2022

Automatic detection of access control vulnerabilities via API specification processing

Objective. Insecure Direct Object Reference (IDOR) or Broken Object Leve...
research
04/30/2021

DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications

The rapid growth of Decentralized Finance (DeFi) boosts the Ethereum eco...
research
12/20/2019

Pentest on an Internet Mobile App: A Case Study using Tramonto

Mobile applications are used to handle different types of data. Commonly...

Please sign up or login with your details

Forgot password? Click here to reset