Monitoring Smartphones for Anomaly Detection
|
|
|
- Charles Cameron
- 10 years ago
- Views:
Transcription
1 Monitoring Smartphones for Anomaly Detection Aubrey-Derrick Schmidt Frank Peters Sahin Albayrak Florian Lamour ABSTRACT In this paper we demonstrate how to monitor a smartphone running Symbian OS in order to extract features that describe the state of the device and can be used for anomaly detection. These features are sent to a remote server, because running a complex intrusion detection system (IDS) on this kind of mobile device still is not feasible, due to capability and hardware limitations. We give examples on how to compute some of the features and introduce the top ten applications used by mobile phone users basing on a study in 25. The usage of these applications is recorded and visualized and for a first comparison, data results of the monitoring of a simple malware are given. Keywords Monitoring, Smartphone, Anomaly Detection, Mobile Device. INTRODUCTION Mobile phones get more and more popular. Since August 26, more mobile phones than inhabitants are registered in Germany [3]. As the capabilities of these devices increase, they are not simple voice centric handsets anymore; rather they provide mobile computing power that can be used for several purposes. Especially smartphones represent a possibility of moving appropriate applications from the PC to mobile devices, as they mostly provide large bandwidth wireless c ACM, 28. This is the author s version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in the proceedings of the First International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications (MOBILWARE 28), Innsbruck, Austria, February 28 Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Mobilware 8 February 2-5, 28, Innsbruck, Austria. Copyright 28 ACM /8/2...$5.. network access, office tools and the possibility of installing third party programs. But with the increase of capabilities, more and more malicious software (malware) targeting these devices emerge. We believe that the evolution of malware for mobile devices will take a similar direction as the evolution of PC malware. This will lead to the same problems, like missing signatures for unknown threats and new appearing malware at high frequency. This paper introduces an approach how to monitor smartphones in order to extract values that can be used for remote anomaly detection. Anomaly detection does not need signatures in order to work, which allows the detection of new and unknown malware. Therefore, it has to be learned what is the normal behavior of a user and device in order to be able to distinguish between normal and abnormal, possibly malicious actions. The extracted features are sent as vector to a remote system, taking the responsibility for extended security measures away from the probably unaware user. These vectors can be used for methods from the field of artificial intelligence, like Artificial Immune Systems (AIS) [5] or Self-Organizing Maps (SOM) [2], in order to detect abnormal behavior. In Section 2 we explain what a smartphone actually is and where it can be used. In Section 3 we show how to build a monitoring client running on a smartphone and give explicit examples on values that can be extracted from Symbian OS devices. In order to be able to learn, what is normally done on smartphones, we map actions excerpted from a study on mobile phone usage to different use cases and specify testing scenarios on them. Examples of these, together with the corresponding monitoring results, are given in Section 4. Finally in Section 5, we conclude the paper and point out the future work. Note that a list of further features measurable on Symbian OS is given in the Appendix. 2. SMARTPHONES In this paper we use the expression smartphone in order to describe a mobile device that mostly unifies functionalities of a cellular phone, a PDA, an audio player, a digital camera and camcorder, a GPS 2 receiver and a PC. In the sense of this work, we will use the expressions smartphone, mobile phone and mobile device equivalently. 2 Global Positioning System
2 Smartphones often use PC-like QWERTY keyboards in order to increase typing speed and sometimes PDA-like pen displays for improved data and command handling. Mechanisms were developed that additionally improve text input, like T9, which means Text on 9 keys and represents predictive text technology. Smartphones use different techniques for creating wireless connections for communication purpose: GSM 3 represents the second generation (2G) of mobile end-to-end communication, mainly used for voice calls and services like SMS 4 GPRS 5 in combination with 2G is often described as 2.5G, as it provides voice and packet data W-CDMA 6 was designed as replacement of GSM and is used in the FOMA 7 system (JP) and UMTS 8, being able to transport data at higher speed than GSM. Additionally, the devices provide Bluetooth, Wireless LAN (WLAN) or IrDA 9 support for shorter range wireless connectivity. Using one of these connections, a user is able to make phone calls, use an internet browser, play multi-player games or read s. Furthermore, the smartphone can be seen as the first platform for pervasive computing[], where interesting areas of application were pointed out by Roussos et al. [2]: Mobile Phones as information service endpoint, e.g. applied as navigational assistance or location based services. Mobile Phones as remote controllers for different devices, like television or HiFi station. Mobile Phones as pervasive network hubs to provide wide area connectivity, e.g. for wearable systems that need to communicate in order to transmit health related data. Mobile Phones as ID tokens in order to store information used to verify the user and information. Smartphones can be applied to these fields, not only, but partly because they have standardized operating systems installed. Following Canalys [4], there are three main competitors in this field: Symbian OS from Symbian Ltd. [4], Windows Mobile from Microsoft [], and Research In Motion (RIM) with the Blackberry devices, with 78.7%, 6.9%, and 3.5% market share on the smart mobile device market, respectively. These operating systems enable the installation of third party applications, which allows customization of the device according to the software needs of the user. But this customization brings the danger of being infected by malware along. According to Peter Gostev from Kaspersky Lab. [6], from June 24 to August 26, 3 new families of malware for mobile devices with 7 variants were recognized, where Caribe was the first worm to hit the mobile community (Symbian OS). 3 Global System for Mobile Communications 4 Short Message Service 5 General Packet Radio Service 6 Wideband Code Division Multiple Access 7 Freedom of Mobile Multimedia Access 8 Universal Mobile Telecommunications System 9 Infrared Data Association Jamaluddin et al. described in [8] how easy it is to write a Trojan horse capable of sending SMS messages to premium services. The usage of this malware is visualized in Subsection THE MONITORING CLIENT Intrusion detection can be separated into two fields: signature-based misuse detection and anomaly detection. As the devices are monitored for anomaly detection, it is important to monitor device data that enables differentiation between normality and anomalies. In [3] Eugene Spafford et al. point out that host-based approaches, direct data collection techniques and internal sensors are preferable to network-based approaches, indirect data collection techniques and external sensors. This was taken into account when designing our monitoring client. 3. The Client Design We propose three main components for the monitoring client: User Interface, Communication Module and Feature Extractor. The User Interface enables command entering, like changing server or port. It can be used to visualize the state of the monitoring client, e.g. sending or buffering, or even to indicate anomaly detection results. The Communication Module is responsible for managing connection states and sending or buffering the feature vectors, which is shown on Figure. If the client cannot connect due to signal loss, it starts buffering until a connection can be established. If a connection is not possible before the buffer is filled, it adds the last extracted vector and removes the first. Device_Connection stored Idle timer tick Acquire data Store to buffer data sent data ready[buffer>=threshold] data ready[buffer<threshold] connection failed data sent Send current data Connect Send buffer connected[buffer=] connected[buffer>] Figure : The possible connection states of the monitoring client The Feature Extractor has several different components gathering and computing features. Features describe the state of the monitored device. They represent various measurements and observations of resources and other hard- and software components. If no direct interfaces are provided by the operating system, features are extracted by using algorithms or methods, which provide approximated results. This is done with care, as additional encumbering of the already limited device possibly distort the monitoring results.
3 3.2 The Symbian Client Figure 2: The Nokia E6 smartphone running the monitoring client. The monitoring client was developed in Symbian C++ version S6 3rd with Nokia Carbide.vs and consists of the three proposed components. The User Interface can be used to change server port and address, to start, stop or move the client into the background. Further user information can be inserted in order to control access to the remote server. For reasons of program stability and to prevent interference, the GUI is running in a thread separate from the other components. Further work may even remove the user interface to a separate application, since there is no need to tie up GUI resources for an application running in the background. The Communication Module uses SOAP Webservices on top of TCP/IP in order to communicate with the server. As we found out, sending data or even just remaining in ready-to-send mode is rather expensive in terms of battery power. To prevent the rapid depletion of the power source, first, all data is stored locally and sent in bulk after reaching a certain threshold level. The Feature Extractor is triggered to fetch new monitored data every thirty seconds, which is stored locally and later, upon reaching the threshold, sent to the server using the appropriate service. 3.3 The Symbian Features Table : An Excerpt of the Extracted Features Name Compl. Description RAM FREE simple Indicates the amount of free RAM in Kbyte USER INACTIV- ITY simple Indicates, if the user was active in the last ten seconds PROCESS COUNT medium Indicates the amount of running processes complex Represents the CPU Usage in percent SMS SENT complex Represents the COUNT amount of SMS messages in the sent directory Symbian OS 2 provides some programming interfaces for extracting features, e.g. fetching the amount of free RAM or the user inactivity time are one-line commands. But not all areas are covered, especially reading network traffic formerly: Simple Object Access Protocol due to hardware limitations 2 tested on Version 9. S6 3rd packets cannot be done by average programmers, as the application programming interfaces are restricted. Some other features need complex method constructs in order to be extracted. We distinguish between three different method complexities: simple, medium and complex. Features that can be called through Symbian C++ interfaces taking only one or few lines of code are categorized as simple. Features that need several classes or algorithms to be computed are marked as complex. Everything in between is marked as medium. Some of the features can be used to identify and manage observed users or devices. In the following, we describe how to compute some of the features shown on Table with pseudo code. Some of these will be used to visualize user activity in Section 4.4 and Section 4.5. In order to present, how Symbian C++ programming looks like, we will show the real call for getting the available RAM: RAM FREE is a feature that can be easily extracted. All applications need more or less RAM in order to work, so every running program/malware should have impact on this value. User::LeaveIfError(HAL::Get( HALData::EMemoryRAMFree, ifreeramsize)); USER INACTIVITY indicates if a button was pressed within the last seconds. If so, a is returned else a. This feature uses a function that returns the absolute user inactivity time in seconds. This value is very interesting for giving hints on activities that are not directly caused by the user and happen automatically and/or periodically in the background. Table 2: Pseudo Code for Indicating User Activity GET UserInactivityTime IF UserInactivityTime seconds RETURN User is inactive ELSE RETURN User is active The can be easily computed through a while loop that is checking the existence of processes. Each started application should increase the process count at least by one, and so should malware. Table 3: Pseudo Code for Getting the Process Count (and Further Information) WHILE there are more processes INCREASE counter FETCH process information from process object STORE process information RETURN the counter The cannot be read through a given Symbian OS interface. While searching for an approximation, we found a method described by Marcus Gröber [7] that
4 manually checks, whether the CPU is busy or not. This is done by requesting a timer event with low priority times a second. Another request with high priority checks every second how often the low priority request was actually called. The answer can be used to approximate the usage of the CPU, as the more the CPU is busy the less the low priority request will be called. The following code fragment shows the main calls and functions of this method. Table 4: Pseudo Code for Approximating the CPU Usage CREATE new requesting Active Object with low priority CREATE new checking Active Object with high priority SEND low priority time request to CPU times/second CHECK the number of accepted requests every second Return approximated CPU usage every second SMS SENT COUNT like every feature relating to messaging (SMS, MMS, and ) needs some more complex functions to be computed. But once implemented, most of the similar features can be extracted using the same classes. Together with USER INACTIVITY this feature can help to indicate malware sending cost causing messages. Table 5: Pseudo Code for Getting the Amount of Sent SMS Messages CREATE messaging session CONNECT messaging session to sent folder SELECT SMS sent folder RETURN amount of SMS messages 3.4 Securing the Monitoring Client As the communi- No. Application Usage cation or even the monitoring client itself can be targeted. SMS 83% 2. Games 6% by malware, it is important to secure the 4. MMS Picture 46% 3. Camera 49% 5 functionality of the 5. PDA Functions 36% client. 6. Internet 3% Using encryption 7. WAP 3% 6 for the communication 8. Bluetooth 28% channel should % be a proper way to. Video Camera 27% secure communications. Securing the Table 6: TNS GTI 25 Top application is more Ten Applications/Services complicated. The Symbian OS API provides a method for setting processes to different critical levels. On highest level, if the monitoring client process is killed, the device reboots and restarts the process. This functionality was not added yet, as it obviously could lead to denial of service attacks on the device, but at least it would guarantee either that the monitoring agent is running or that the user brings the device to a specialist. Another possibility is checking the running applications, that are clearly identifiable through a unique ID, and as soon as an unknown application is started, this could be compared with an application white list, that includes all allowed programs. If an unknown program was started, the system could kill it or alert the user and system. 4. EXPERIMENTS As our goal is to provide data that enables differentiation between normal and malicious device usage, we need to know first, what actually is normal. TNS Technology released a booklet [5] sourced from the TNS Technology s Global Technology Insight (GTI) 25, where typical user actions on mobile phones are described. We excerpted actions that we performed on a Nokia E6 smartphone [] in order to monitor normality. The corresponding software behaviors, visualized as data results, can be found in the Section TNS GTI 25 Study The GTI 25 bases on data coming from 687 people aged 6 to 49, in 5 different countries. These respondents used a mobile phone (657 persons), PDA or laptop and accessed the internet at least once a week. The study partly focused on the adaption of technology applications on mobile devices [5], which we used to excerpt the top ten actions, that were introduced in that work. These top ten actions base on the percentage of mobile phone users, who use the corresponding application and can be seen on Table Testing Specification In order to perform the actions, we had to specify testing scenarios where we had to distinguish between different use cases, for example a smartphone user can send and receive a SMS message of various size with various recipients. We identified about 4 use cases and specified a testing protocol for each. An example protocol is given on Table Technical Set Up We used the Nokia E6 smartphone for testing, which is running Symbian OS 9. and has a QWERTY keyboard. It supports most of the conventional techniques and protocols used in current smartphones, for example WCDMA and WLAN. A 64Mbyte storage card is plugged, which allows storage of various files, like videos, which then can be viewed on the pixel display []. The installed Symbian-C++ monitoring client was triggered for sending a feature vector every 2 seconds to our test server with public IP-address and attached database. This is done using a Webservice via UMTS-connection. The feature vector, that was sent, has a size of less than 8 Kbyte and contains about 5 features. 4.4 Results On the Figure 3 you can see the usage of most of the top ten applications: Figure 3 shows on the upper left the usage of the Short Message Service. It is separated into four parts: sending empty message, writing and sending a 5-character message, writing and sending a 3-character message and writing and sending a 5-character message with multiple recipients. The upper center shows the usage of three different kinds of games: a simple game called Miniblaster, a more
5 SMS SENT COUNT MMS SENT COUNT BLUETOOTH STATUS USER INACTIVITY HD FREE USER INACTIVE CONNECTION COUNT BT STATUS USER INACTIVITY HD FREE CONNECTION COUNT MAIL SMTP SENT COUNT Figure 3: Actions monitored on a Nokia E6: u.l. sending SMS messages, u.c. simple/3d/multiplayer gaming, u.r. sending MMS messages, c.l. PDA function reading.pdf file, c.c. internet browsing, c.r. Bluetooth data transfer, b.l. sending , b.c. mp3 download, b.l. PDA function creating new calendar entry complex game named Sky Force Reloaded and Miniblaster in multi player Bluetooth mode. The upper right visualizes sending an empty MMS message, writing and sending a 5-character MMS message and writing and sending a MMS message with attached picture. The center left represents the usage of PDA functionalities; in detail it is reading a.pdf file. Browsing the internet can be seen on center graph, where different links were clicked and a picture was downloaded. The center right refers to sending an image to a paired Bluetooth device. The bottom left displays sending of various s. On the bottom center graph, we used the internet to download an 8 Mbyte MP3 file, which was played afterwards. Finally, the bottom right graph represents the making of a new entry into the calendar. What we can see, although the number of vectors varies on the different figures, is that each application affects the corresponding features in a different way, for example gaming produces much more CPU utilization than creating and sending MMS messages. This encourages the attempt to apply anomaly detection to the field of malware detection. 4.5 Malware Data As we mentioned before, we use the malware proposed by SMS SENT COUNT Figure 4: Malware activity on a Nokia E6 Jamaluddin et al. [8] in order to monitor example malicious behavior. If activated, this malware sends a SMS message every time the key 2 is pressed. In Figure 4, every time the SMS SENT COUNT increases, an increase of processes and CPU busyness and a decrease of available RAM can be
6 Table 7: The Testing Specification for Multi-player Game - Miniblaster Preconditions: Miniblaster is installed on two devices Bluetooth is disabled settings in Miniblaster: music/sound enabled Two minutes of non-device-usage before testing Testing:. Launch Miniblaster on both devices 2. Start hosting on one device 3. Join game on second device 4. Play two rounds 5. Host exits game with left selection key 6. Second device confirms note and exits 7. Two minutes of non-device-usage Expected Results: Fall of Raise of Bluetooth gets enabled Data transfer observed. At vector count 96 we determined, that a Nokia E6 device only can hold SMS messages, which lead to the deletion of these. 5. CONCLUSION AND FUTURE WORK In this paper we demonstrated how a smartphone can be monitored in order to transmit feature vectors to a remote server. The gathered data is intended to be used for anomaly detection methods that analyze the data for distinguishing between normal and abnormal behavior. Abnormal behavior can indicate malicious software activity. Furthermore, even unknown malware can be detected, since no signatures are used. In our results we saw, that most of the top ten applications preferred by mobile phone users affect the monitored features in different ways. This strengthens the approach of using anomaly detection in order to detect malware on mobile devices. Gathering more data from different kinds of smartphones that are running different operating systems, like MS Windows Mobile or Palm OS, will be one of the tasks that we will focus in future. Furthermore, additional malware is needed for increasing the quality of our data sets. If these sets are big enough, we will start to test methods from various fields from computer science, like AI and information retrieval, in order to attempt to detect the malicious activities. A first step towards this can be seen in [9] from our colleague Katja Luther et al., where a biological inspired immune system analysis feature-based network data. Acknowledgments This work was funded by Deutsche Telekom Laboratories. 6. REFERENCES [] Gregory D. Abowd, Liviu Iftode, and Helena Mitchel. The Smart Phone: A First Platform for Pervasive Computing. IEEE Pervasive Computing, pages 8 9, 25. April-June. [2] Sahin Albayrak, Christian Scheel, Dragan Milosevic, and Achim Müller. Combining Self-Organizing Map Algorithms for Robust and Scalable Intrusion Detection. In M. Mohammadian, editor, Proceedings of International Conference on Computational Intelligence for Modelling Control and Automation (CIMCA 25), pages IEEE Computer Society, 25. [3] Bundesverband Informationswirtschaft Telekommunikation und neue Medien e.v.- BITKOM. Mehr Handys als Einwohner in Deutschland. (5. August 27), 26. [4] Canalys. EMEA Q Highlights from the Canalys Research. (5. August 27), 26. [5] Stephanie Forrest, Alan S. Perelson, Lawrence Allen, and Rajesh Cherukuri. Self-nonself Discrimination in a Computer. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages IEEE Computer Society Press, 994. [6] Alexander Gostev. Mobile Malware Evolution: An Overview, Part. analysis?pubid=2996 (5. August 27), September 26. [7] Marcus Gröber. Applications for Symbian. (5. August 27). [8] Jazilah Jamaluddin, Nikoletta Zotou, Reuben Edwards, and Paul Coulton. Mobile Phone Vulnerabilities: A New Generation of Malware. In Proceedings of the 24 IEEE International Symposium on Consumer Electronics, pages 99 22, September 24. [9] Katja Luther, Rainer Bye, Tansu Alpcan, Sahin Albayrak, and Achim Müller. A Cooperative AIS Framework for Intrusion Detection. In Proceedings of the IEEE International Conference on Communications (ICC 27), 27. [] Microsoft Corporation. Windows Mobile. windowsmobile/default.mspx (5. August 27), 27. [] Nokia. Nokia E6. (5. August 27), 27. [2] George Roussos, Andy J. March, and Stavroula Maglavera. Enabling Pervasive Computing with Smart Phones. IEEE Pervasive Computing, pages 2 27, 25. April-June. [3] Eugene Spafford and Diego Zamboni. Data Collection Mechanisms for Intrusion Detection Systems. CERIAS Technical Report 2-8, CERIAS, Purdue University, 35 Recitation Building, West Lafayette, IN, June 2.
7 [4] Symbian Software Limited. Symbian OS - the mobile operating system. (5. August 27), 27. [5] TNS Technology. Consumer Trends in Mobile Applications - A TNS Technology Briefing for Technology Decision Makers. (5. May 27), 25.
Monitoring Smartphones for Anomaly Detection
ACM Mobile Networks and Applications manuscript No. (will be inserted by the editor) Monitoring Smartphones for Anomaly Detection Aubrey-Derrick Schmidt Frank Peters Florian Lamour Christian Scheel Seyit
Lecture Embedded System Security A. R. Sadeghi, @TU Darmstadt, 2011 2012 Introduction Mobile Security
Smartphones and their applications have become an integral part of information society Security and privacy protection technology is an enabler for innovative business models Recent research on mobile
User Guide. BlackBerry Storm 9530 Smartphone. Version: 4.7
BlackBerry Storm 9530 Smartphone Version: 4.7 SWD-490426-0909090640-001 Contents Shortcuts... 9 BlackBerry basics shortcuts... 9 Phone shortcuts... 9 Camera shortcuts... 9 Media shortcuts... 9 Typing shortcuts...
Mobile Operating Systems Lesson 07 Symbian OS
Mobile Operating Systems Lesson 07 Symbian OS Oxford University Press 2007. All rights reserved. 1 Oxford University Press 2007. All rights reserved. 2 Symbian OS multi-modal communication support OS for
Mobile Device Manual for 3G DVRs
Mobile Device Manual for 3G DVRs The 3G DVR can be monitored with APPS for supported mobile device operating systems. Please refer to the table below for your specific mobile device application. Please
BlackBerry Device Software. Protecting BlackBerry Smartphones Against Malware. Security Note
BlackBerry Device Software Protecting BlackBerry Smartphones Against Malware Security Note Published: 2012-05-14 SWD-20120514091746191 Contents 1 Protecting smartphones from malware... 4 2 System requirements...
2 Selecting Operating System - Symbian OS
1 Introduction One of the very first steps of this project, is to choose the device on which we are going to develop and test the application, that will enable interaction with the RFID Guardian. Some
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
Discovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
Nokia E61i Configuring connection settings
Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or
The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.
Course Assessment Answers-1 Course Assessment The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate. 1. A person
Configuring connection settings
Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90
Python for Series 60 Platform
F O R U M N O K I A Getting Started with Python for Series 60 Platform Version 1.2; September 28, 2005 Python for Series 60 Platform Copyright 2005 Nokia Corporation. All rights reserved. Nokia and Nokia
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Mobile Commerce and Ubiquitous Computing. Chapter 6
Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure
Net Protector Admin Console
Net Protector Admin Console USER MANUAL www.indiaantivirus.com -1. Introduction Admin Console is a Centralized Anti-Virus Control and Management. It helps the administrators of small and large office networks
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser
Remote Desktop Access through Android Mobiles and Android Mobiles Access through Web Browser 1 Karan Sandeep Bhandari, 2 Vishnu Baliram Mandole, 3 Akash Dattatray Munde, 4 Sachin B. Takmare Bharati Vidyapeeth
Analysis of advanced issues in mobile security in android operating system
Available online atwww.scholarsresearchlibrary.com Archives of Applied Science Research, 2015, 7 (2):34-38 (http://scholarsresearchlibrary.com/archive.html) ISSN 0975-508X CODEN (USA) AASRC9 Analysis of
Case Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Feature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
Are free Android virus scanners any good?
Authors: Hendrik Pilz, Steffen Schindler Published: 10. November 2011 Version: 1.1 Copyright 2011 AV-TEST GmbH. All rights reserved. Postal address: Klewitzstr. 7, 39112 Magdeburg, Germany Phone +49 (0)
CamGuard Security System CamGuard Security System Manual
CamGuard Security System Manual JMC Electron Co.,LTD Brief Introduction... 3 Features... 3 System Requirements... 3 Configuration... 4 Add Camera... 4 Device Options... 4 About Alarm... 5 Alarm Actions...
ESET Mobile Security Business Edition for Windows Mobile
ESET Mobile Security Business Edition for Windows Mobile Installation Manual and User Guide Click here to download the most recent version of this document Contents 1. Installation...3 of ESET Mobile Security
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN: 2320-8791 www.ijreat.
Intrusion Detection in Cloud for Smart Phones Namitha Jacob Department of Information Technology, SRM University, Chennai, India Abstract The popularity of smart phone is increasing day to day and the
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Data Synchronization in Mobile Computing Systems Lesson 06 Synchronization Software HotSync, ActiveSync and Intellisync
Data Synchronization in Mobile Computing Systems Lesson 06 Synchronization Software HotSync, ActiveSync and Intellisync Oxford University Press 2007. All rights reserved. 1 Synchronization software A synchronizer
Mobile Operating Systems Lesson 05 Windows CE Part 1
Mobile Operating Systems Lesson 05 Windows CE Part 1 Oxford University Press 2007. All rights reserved. 1 Windows CE A 32 bit OS from Microsoft Customized for each specific hardware and processor in order
INSIDE. Malicious Threats of Peer-to-Peer Networking
Symantec Security Response WHITE PAPER Malicious Threats of Peer-to-Peer Networking by Eric Chien, Symantec Security Response INSIDE Background Protocols New Vector of Delivery Malicious Uses of Peer-to-Peer
Mobile Devices and Systems Lesson 02 Handheld Pocket Computers and Mobile System Operating Systems
Mobile Devices and Systems Lesson 02 Handheld Pocket Computers and Mobile System Operating Systems Oxford University Press 2007. All rights reserved. 1 Handheld Pocket Computers Come in many manifestations
Quick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
Endpoint Security Console. Version 3.0 User Guide
Version 3.0 Table of Contents Summary... 2 System Requirements... 3 Installation... 4 Configuring Endpoint Security Console as a Networked Service...5 Adding Computers, Groups, and Users...7 Using Endpoint
9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,
How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture
, pp. 127-136 http://dx.doi.org/10.14257/ijfgcn.2015.8.1.14 High Secure Mobile Operating System Based on a New Mobile Internet Device Hardware Architecture Gengxin Sun and Sheng Bin International College
Junos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
Crystal Gears. Crystal Gears. Overview:
Crystal Gears Overview: Crystal Gears (CG in short) is a unique next generation desktop digital call recording system like no other before. By widely compatible with most popular telephony communication
9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice
SIEMENS MOBILE PHONE MANAGER (MPM) AND BLACKBERRY BUILT-IN DESKTOP MANAGER IN USE WITH THE SIEMENS SK65
SIEMENS MOBILE PHONE MANAGER (MPM) AND BLACKBERRY BUILT-IN DESKTOP MANAGER IN USE WITH THE SIEMENS SK65 www.siemens.com/sk65 Content Overview... 3 Technical Requirements... 3 Siemens Mobile Phone Manager...
MOBILE TECHNOLOGIES AND DISTANCE EDUCATION
MOBILE TECHNOLOGIES AND DISTANCE EDUCATION Rostislav Fojtik, Hashim Habiballa Abstract: Rapid advancement of information and communication technologies enables to produce more mobile devices. Most of distance
Deployment Guide for Maximum Security Environments Polycom HDX Systems, Version 3.0.5
Polycom HDX Systems, Version 3.0.5 A warning about operating in a maximum security environment The maximum security profile is designed to lock down communications to the most stringent requirements of
Access alternatives to mobile services and content: analysis of handset-based smartphone usage data
Access alternatives to mobile services and content: analysis of handset-based smartphone usage data ([email protected]) ITS 17th Biennial Conference Montreal, Canada, June 24-27, 2008 Outline Introduction
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Mobile Phone Terminology Simplifying telecoms management
Mobile Phone Terminology Simplifying telecoms management _ 3G The next generation mobile network, launched in the UK in March 2003, pushed heavily by the company, Hutchison 3. The other major networks
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
Comparative Study of Different Mobile Operating Systems
International Journal of Advancements in Research & Technology, Volume 2, Issue3, March-2013 1 Comparative Study of Different Mobile Operating Systems T.N.Sharma, Mahender Kr. Beniwal, Arpita Sharma ABSTRACT:
Ethernet Adapter Owner's Manual
Corinex Intelligent PowerNet Corinex Intelligent PowerNet Ethernet Adapter Owner's Manual This Owner s Manual, as well as the software described in it, is furnished under license and may be used or copied
Avira Server Security. HowTo
Avira Server Security HowTo Table of Contents 1. Setup Modes... 3 1.1. Complete...3 1.2 Custom...3 2. Configuration... 8 2.1 Update configuration for the Avira Update Manager...8 2.2 Configuration of product
Mitel Unified Communicator Advanced
Mitel Unified Communicator Advanced Quick Reference Guide About UC Advanced Unified Communicator (UC) Advanced is a software communications product integrated with the advanced call management features
Quick Start Guide Vodafone Mobile Connect USB Stick. Designed for Vodafone
Quick Start Guide Vodafone Mobile Connect USB Stick Designed for Vodafone Welcome to the world of mobile communications 1 Welcome 2 Set up your USB Stick 3 Start the software 4 Software overview 5 Connect
Crystal Innovation Solution 16 Moshe Shapira St., Rishon Le-Zion, 75704, Israel www.crystalrs.com. Crystal Gears
Crystal Gears Why Crystal Gears - product Overview To ensure compliance with increased strict regulations, customer service quality, employee productivity, sales Verification and business intelligence,
ipecs Communicator Installation and Operation Guide Please read this manual carefully before operating your set. Retain it for future reference.
ipecs Communicator Installation and Operation Guide ipecs is an Ericsson-LG Brand Please read this manual carefully before operating your set. Retain it for future reference. Revision History Issue Date
Best Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
MEDIA CONTROL SERVER 2.0
MEDIA CONTROL SERVER 2.0 Version 2.0 Getting Started Guide This getting started guide will help you install and configure the Autonomic Controls Media Control Server and Mirage client. Contents OVERVIEW...
USER S GUIDE FOR. Nokia PC Suite 6.84
USER S GUIDE FOR Nokia PC Suite 6.84 Contents 1. Introduction...1 1.1 Nokia PC Suite applications...1 1.2 Must haves...2 1.3 More information...4 2. Installing Nokia PC Suite...5 2.1 Before installation...5
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
mysensors mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide Information to Users Inside the Box mysensors Ethernet Gateway Quick Start
mysensors Information to Users mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide This equipment has been tested and found to comply with the limits for a Class B digital devices, pursuant
Chris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
Malicious Software for Smartphones
Malicious Software for Smartphones Technical Report: TUB-DAI 02/08-01 Aubrey-Derrick Schmidt and Sahin Albayrak February 10, 2008 DAI-Labor der Technischen Universität Berlin Prof. Dr.-Ing. habil. Sahin
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
Mobile System Technologies Certification Program
Mobile System Technologies Certification Program This is the Mobile Computing Promotion Consortium s (MCPC) official certification program for engineers who wish to obtain deeper knowledge of and experience
3. Security. 3.1. Security center. Open the Settings app. Tap the Security option. Enable the option Unknown sources.
G DATA Software 1. Introduction G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against malware, intrusive apps and phishing attacks. Locate lost devices or wipe their content remotely
Wireless Network Standard and Guidelines
Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining
NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION. Policy Statement:
Policy Statement: NineStar Connect MASS MARKET INTERNET SERVICE POLICIES AND CUSTOMER INFORMATION The following policies apply to mass market broadband Internet services offered by NineStar Connect. NineStar
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
Norton Mobile Privacy Notice
Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy
IPS Attack Protection Configuration Example
IPS Attack Protection Configuration Example Keywords: IPS Abstract: This document presents a configuration example for the attack protection feature of the IPS devices. Acronyms: Acronym Full spelling
Performance monitoring and analysis of wireless communication protocols for mobile devices
Performance monitoring and analysis of wireless communication protocols for mobile devices Almudena Díaz, Pedro Merino, F. Javier Rivas Departamento de Lenguajes y Ciencias de la Computación, University
McAfee.com Personal Firewall
McAfee.com Personal Firewall 1 Table of Contents Table of Contents...2 Installing Personal Firewall...3 Configuring Personal Firewall and Completing the Installation...3 Configuring Personal Firewall...
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
Mobiel Internet Dashboard. Manual
Mobiel Internet Dashboard Manual Contents Chapter 1 Welcome to the Mobiel Internet Dashboard support manual Chapter 4 The Mobiel Internet Dashboard interface About this manual 6 Opening the Mobiel Internet
Nokia for Business. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia for Business Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E50 Configuring connection settings Nokia E50 Configuring connection settings Legal Notice Copyright
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
TANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
Policy and Profile Reference Guide
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy
MITEL UNIFIED COMMUNICATOR ADVANCED
MITEL UNIFIED COMMUNICATOR ADVANCED About UC Advanced Mitel Unified Communicator (UC) Advanced is a software communications product integrated with the advanced call management features of Mitel Communications
Dell NetReady Mobile Broadband Service User's Guide
Dell NetReady Mobile Broadband Service User's Guide Introduction Quick Start Service Coverage Frequently Asked Questions Glossary Information in this document is subject to change without notice. Introduction:
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
HomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
Student Halls Network. Connection Guide
Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to
How To Use The Topsec Phone App On A Cell Phone (For Free)
Rohde & Schwarz SIT GmbH Usermanual PAD-T-M: 3574.3259.02/01.00/CI/1/EN R&S TopSec Mobile TopSec Phone Windows PC Usermanual 1234.5678.02 01 2013 Rohde & Schwarz GmbH & Co. KG Muehldorfstr. 15, 81671 Munich,
BitDefender Security for Exchange
Quick Start Guide Copyright 2011 BitDefender 1. About This Guide This guide will help you install and get started with BitDefender Security for Exchange. For detailed instructions, please refer to the
Optimizing Wireless Networks.
from the makers of inssider Optimizing Wireless Networks. Over the past few years, MetaGeek has created tools to help users optimize their wireless networks. MetaGeek s tools help visualize the physical
HP ProLiant ML150 System Monitor User Guide
HP ProLiant ML150 System Monitor User Guide November 2003 Contents Introduction... 1 MSM Features...1 Installing MSM... 3 Installing MSM Server on the Server...3 Installing MSM Console on a Client PC...3
Converging Networks Laboratory
Converging Networks Laboratory Foresight to future technologies in a world class R&D facility +358 40 547 9441 Divergence Services Voice video email data web TV information entertainment purchasing Communities,
Mobile Devices and Malicious Code Attack Prevention
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Malicious Code and Mobile Devices: Best Practices for Securing Mobile Environments Sponsored
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
