Title: A threat monitoring system in enterprise networks with smart mobiles

Authors: Zhijiang Chen; Linqiang Ge; Guobin Xu; Wei Yu; Robert F. Erbacher; Hasan Cam; Nnanna Ekedebe

Addresses: Department of Computer and Information Science, Towson University, Towson, MD 21252, USA ' Department of Computer and Information Science, Towson University, Towson, MD 21252, USA ' Department of Computer and Information Science, Towson University, Towson, MD 21252, USA ' Department of Computer and Information Science, Towson University, Towson, MD 21252, USA ' Network Science Division, Army Research Laboratory, Adelphi, MD 20783, USA ' Network Science Division, Army Research Laboratory, Adelphi, MD 20783, USA ' Department of Computer and Information Science, Towson University, Towson, MD 21252, USA

Abstract: With the development of modern mobile operating systems, computing, and communication technologies, smart mobile devices have been widely used to support rich applications and have been integrated into enterprise networks for organisations to improve business operations. When accessing sensitive pieces of personal and business information, the lack of strong security in smart mobile devices has become a serious issue. In this paper, we developed a threat monitoring system to monitor and detect threats in enterprise networks with mobile devices. We implemented both signature and anomaly based schemes to monitor and detect threats. To evaluate the effectiveness of our threat monitoring system, we used real-world samples of benign apps and malware samples to conduct experiments on Android mobile devices. Our experimental data shows that our developed system can accurately and effectively detect malware on the Android platform while incurring low overhead to the system in terms of energy and CPU usage.

Keywords: smart mobile networks; threat monitoring systems; signature; anomaly based detection; threat detection; enterprise networks; benign apps; malware; Android; mobile devices; network security.

DOI: 10.1504/IJSN.2016.075073

International Journal of Security and Networks, 2016 Vol.11 No.1/2, pp.66 - 81

Received: 16 Oct 2014
Accepted: 17 Apr 2015

Published online: 02 Mar 2016 *

Full-text access for editors Access for subscribers Purchase this article Comment on this article