Attack Detection Application with Attack Tree for Mobile System using Log Analysis

Duhoe Kim,Dongil Shin,Dongkyoo Shin,Yong-Hyun Kim
DOI: https://doi.org/10.1007/s11036-018-1012-4
2018-01-20
Mobile Networks and Applications
Abstract:Recently, the use of smart phones has greatly increased because of the development of cheap high-performance hardware. The biggest threat to a smart phone user is the loss of his/her personal information by an attacker. To protect a user’s information from these threats, an attack detection application for the Android OS is proposed and developed, in which the detection system is comprised of two phases: the mobile detection system pre-phase and post-phase. The pre-phase includes the steps performed before an attack occurs for the comparison and analysis step of the post-phase, and the post-phase includes the steps performed to detect malware using an attack tree with level assignments from the post-phase. Three classes, interception, modification, and system damage, are defined to classify attacks to determine the attacker’s purpose. When an attack occurs, the application can recognize what kind of route the mobile attack goes through by comparing and analyzing the attack tree from the pre-phase and current attack data in the post-phase. Attack trees are used to easily extract attack scenarios and determine when an attack is occurring. We expect that using the proposed application will protect a user’s personal information on a mobile system.
computer science, information systems,telecommunications, hardware & architecture
What problem does this paper attempt to address?