Show simple item record

dc.contributor.supervisorFurnell, Steven
dc.contributor.authorZincir, Ibrahim
dc.contributor.otherFaculty of Science and Engineeringen_US
dc.date.accessioned2011-10-26T08:03:15Z
dc.date.available2011-10-26T08:03:15Z
dc.date.issued2011
dc.date.issued2011
dc.identifier239198en_US
dc.identifier.urihttp://hdl.handle.net/10026.1/884
dc.descriptionThe file(s) associated with this record are no longer available. [JC][04.02.2013]
dc.description.abstract

In the last 20 years mobile devices gained an important role in daily life and became must have items for everyone. As mobile devices give us the much needed flexibility and mobility, they also represent one major concern; security. As the information is transmitted from node to node via radio frequencies, an imposter can gain access into a mobile network without the need to gain physical access to firewalls and gateways. Also, as they are light and small, mobile devices are easily lost and often used without any PIN or password protection enabled. Hence, it is not difficult for someone even without any technical knowledge to gain access to such devices if they have been left behind or stolen. As traditional intrusion detection systems are not very effective against this kind of attack, there is a need of a different approach that can assist in the identification of a potential imposter. This thesis begins by assessing the security needs of the mobile devices, and establishes the perceived inadequacy of existing safeguards in this respect. Therefore this research considers using Behaviour-Based Mobile Intrusion Detection System (BeMIDS) that aims to assist the identification of anomalous user activity. This in return presents the two main characteristics needed to classify a legitimate user inside a mobile network: first with whom, when and what type of connection is established and then at where the mobile device is left open. After this the research proposes a novel approach that investigates the application of three machine learning algorithms to profile user behaviour in mobile networks.

In BeMIDS, historical user profiles are created and then compared with the real-time ones in order to detect unusual activity in mobile networks. If a user’s behaviour changes, this results in alerting the system as an anomalous activity. Specific examples of behaviours that BeMIDS appears to be particularly sensitive to include duration (of calls and of connection with cell towers), time of day (calls are made and cell towers are connected), and frequency of caller usage. In order to classify a legitimate user over a mobile network the thesis then validates this approach by implementing C4.5, RIPPER and SOM algorithms over MIT’s Reality Mining Dataset. The results support the proposed architecture and present accuracy rate as high as 96% for call logs and 94% for tower logs under training conditions.

en_US
dc.language.isoenen_US
dc.publisherUniversity of Plymouthen_US
dc.subjectMobile networks, behavioural profiling
dc.subjectMobile networks, securityen_US
dc.titleBehavioural Profiling In Mobile Networksen_US
dc.typeThesis
dc.identifier.doihttp://dx.doi.org/10.24382/4777


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV