Anomaly Detection on Mobile Phone Based Operational Behavior(Contingency Management/Risk Management)
スポンサーリンク
概要
- 論文の詳細を見る
Information protection schemes on mobile phones become important challenges because mobile phones have many types of private information. In general, user authentication and anomaly detection are effective to prevent attacks by illegal users. However, the user authentication can be applied only at the beginning of use and the conventional anomaly detection is not suited for mobile phones, only but computer systems. In this paper, we propose a simple and easy-to-use anomaly detection scheme on mobile phones. The scheme records the keystrokes as the mobile phone is operated, and an anomaly detection algorithm calculates a score of similarity, to detect illegal users. We implemented a prototype system on the BREW (Binary Run-time Environment for Wireless) emulator and evaluated error rates by using results from 15 testers. From experiments results, we show the proposed scheme is able to apply the anomaly detection by checking the similarity score several times.
- 一般社団法人情報処理学会の論文
- 2008-01-15
著者
-
Sasase Iwao
Department Of Information And Computer Science Keio University
-
Takemori Keisuke
Kddi R & D Laboratories
-
ISOHARA TAKAMASA
Department of Information and Computer Science, Keio University
関連論文
- Spreading Code Assignment for Multicarrier CDMA System over Frequency-Selective Fading Channels(Terrestrial Radio Communications)
- Adaptive Subcarrier Block Modulation with Differentially Modulated Pilot Symbol Assistance for Downlink OFDM Using Uplink Delay Spread
- Interference Reduction Scheme for UHF Passive RFID Systems Using Modulation Index Control
- Resource allocation for multiuser-MIMO-OFDM uplink system (通信方式)
- BS-7-20 Resource Allocation for Multiuser-MIMO-OFDM Uplink System with Proportional Data Rate Fairness(BS-7. Network Planning, Control and Management)
- Multiple Metrics Gateway Selection Scheme in Mobile Ad Hoc Network (MANET) and Infrastructure Network Integration
- Energy Efficient and Stable Weight Based Clustering for Mobile Ad Hoc Networks
- A Mitigation Technique of High-Power MAI in the Multimedia Optical CDMA System with the Optical Power Selector
- Resource Allocation Scheme in MIMO-OFDMA System for User's Different Data Throughput Requirements
- Multiple Subcarrier Modulation for Infrared Wireless Systems Using Punctured Convolutional Codes and Variable Amplitude Block Codes(Optical Wireless Communications)
- Optical Spread Time CDMA Communication Systems with PPM Signaling
- A Kalman Filter Merging CV and Kinetic Acceleration Estimation Model Using Mode Probabilities(Navigation, Guidance and Control Systems)
- A Kalman Estimator using Two Directions of Angular Velocity, Vol.J86-B,No.2, pp.255-267
- A Kalman Filter with a Turning Acceleration Estimation Using Mode Probability
- BS-4-1 Singular Value Based Adaptive Bit Loading for 2×2 MIMO Systems in Spatially Correlated or Uncorrelated Rayleigh Fading Channels
- The Mitigation of MAI for OOK-CDMA Systems with Optical Hard-Limiters by Transmitting Optical Pulses with Two-Level Intensities(Fiber-Optic Transmission)
- The Mitigation of MAI for OOK-CDMA Systems with Optical Hard-Limiters by Transmitting Optical Pulses with Two-Level Intensities
- Code Orthogonalizing Filter Based Adaptive Array Antenna Using Common Correlation Matrix of Time Domain Signals for Multicarrier DS/CDMA Systems
- Evaluation of Optimum Adaptive Antenna Array Beam Forming Configuration Considering Diversity Effect in W-CDMA Forward Link(Special Section on Multi dimensional Mobile Information Networks)
- Steady-state Kalman filtering for channel estimation in OFDM systems utilizing SNR (通信方式)
- Exact Analysis of Class DE Amplifier with FM and PWM Control(Energy in Electronics Communications)
- Anomaly Detection on Mobile Phone Based Operational Behavior(Contingency Management/Risk Management)
- An optimum multiple metrics gateway selection mechanism in MANET and infrastructured networks integration (通信方式)
- Detection of Bot Infected PC Using Destination-based IP Address and Domain Name Whitelists
- Reduced Complexity in Antenna Selection for Polarized MIMO System with SVD for the Practical MIMO Communication Channel Environment
- Multicast Routing and Wavelength Assignment for Dynamic Multicast Sessions in WDM Network Using Minimum Delta
- Video Transmission with Variable Video Coding Rate and Copy Data Transmission over Wireless 1394, Vol.J86-B,No.3, pp.560-575
- BS-12-2 Efficient Subcarrier Utilization for OFDMA Systems by Intra-Cell Subcarrier Sharing with Cooperative Base Stations(BS-12. Network Planning, Control, and Management)
- BS-12-13 Energy Efficient Weight Based Clustering Algorithm for MANETs(BS-12. Network Planning, Control, and Management)
- Interference Avoidance Algorithms for Passive RFID Systems Using Contention-Based Transmit Abortion(Wireless Communication Technologies)
- Performance Analysis of ADSL with Punctured Convolutional Code
- Optical CDMA Network System Using Double Coding Scheme
- BS-3-22 A Novel Higher Wireless Connection-Capacity Route Selection Algorithm for Automobiles(BS-3. Management and Control Technologies for Innovative Networks)
- Proportional Data Rate Fairness Resource Allocation for MIMO-OFDM Multiple Access Channel by Considering the Correlation Effect of Line of Sight and Non Line of Sight Channel Conditions
- BS-5-32 WiMAX-based Performance Evaluations of Autonomous Primary User Detection Scheme Exploiting Cyclic Prefix and Pilot Signal(BS-5. Network and Service Design, Control and Management)
- IP Traceback Using DNS Logs against Bots
- Anomaly Detection on Mobile Phone Based Operational Behavior
- Anomaly Detection on Mobile Phone Based Operational Behavior
- Adaptive Subcarrier Block Modulation with Differentially Modulated Pilot Symbol Assistance for Downlink OFDM Using Uplink Delay Spread